Add Wish List Add to Cart The item has been added Detection of Intrusions and Malware, and Vulnerability Assessment On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Financial Cryptography and Data Security The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distributed Computing in Sensor Systems The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, held in Marina del Rey, California, USA in June/July 2005. The 26 revised full papers... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quality of Service - IWQoS 2005 We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany. We hope that all attendees enjoyed their time in that ancient and historic city. Quality of ... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applications and Theory of Petri Nets 2005 This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security and Cryptology - ICISC 2004 The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communi- tion of... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Human Interactive Proofs E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - EUROCRYPT 2005 These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Scientific Applications of Grid Computing We wish to extend a warm welcome to the reader of this extended postp- ceedings publication of SAG 2004, the 1st International Workshop on Scienti?c Applications on Grid Computing. This workshop was held in September 2004, in... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Practice and Experience The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Operational Semantics for Timed Systems This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Pervasive Computing This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Grid Computing in Life Science Researchers in the ?eld of life sciences rely increasingly on information te- nology to extract and manage relevant knowledge. The complex computational and data management needs of life science research make Grid technologies... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Embedded Systems Design Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions,... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Systems Aspects in Organic and Pervasive Computing - ARCS 2005 The keychallengeforfuture computersystemis dealingwithcomplexity.Onone hand this involves internal system complexity which has increased exponentially over recent years. Here the main objectives are to maintain system ... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Networking Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986,... RRP: $327.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Topics in Cryptology -- CT-RSA 2005 The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Peer-to-Peer Systems III On February 26-27, 2004, the 3rd International Workshop on Peer-to-Peer S- tems (IPTPS 2004) brought researchers and practitioners together to discuss the latest developments in peer-to-peer technologies, applications, and... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT 2004 The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5-9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Communication Networks The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Computing This volume collects revised versions of some of the papers presented at the S- ond IST/FET International Workshop on Global Computing held in Rovereto, Italy (9-12 March, 2004). The workshop involved all the thirteen projects... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distributed Computing -- IWDC 2004 Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata,... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Power-Aware Computer Systems Welcome to the proceedings of the 3rd Power-Aware Computer Systems (PACS 2003) Workshop held in conjunction with the 36th Annual International Symposium on Microarchitecture (MICRO-36). The increase in power and - ergy... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information and Communications Security This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ´ Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing,... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network and Parallel Computing This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Architecting Dependable Systems II As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Software Security - Theories and Systems Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Utility Computing This volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe13thIFIP/IEEEInternationalWorkshop on Distributed Systems: Operations and Management (DSOM 2004), which was held at... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Formal Techniques for Networked and Distributed Systems - FORTE 2004 This volume contains the proceedings of the 24th IFIP TC 6/WG 6.1 Inter- tionalConference onFormalTechniquesfor Networkedand Distributed Systems (FORTE 2004),held in Madrid, Spain, September 27-30,2004.FORTE denotes a series of... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Advances in Intrusion Detection On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France,... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Software and Compilers for Embedded Systems This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Computer Systems Architecture On behalf of the program committee, we were pleased to present this year's program for ACSAC: Asia-Paci?c Computer Systems Architecture Conference. Now in its ninth year, ACSAC continues to provide an excellent forum for... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Security - ESORICS 2004 ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13-15, 2004 in Sophia Antipolis, France... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Data Management Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Trust and Privacy in Digital Business Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two ... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Financial Cryptography The8thAnnualFinancialCryptographyConferencewasheldduring9-12Feb- ary 2004 in Key West, Florida, USA. The conference was organized by the - ternational Financial Cryptography Association (IFCA). The program committee, which... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Grid and Cooperative Computing Grid and cooperative computing has emerged as a new frontier of information tech- logy. It aims to share and coordinate distributed and heterogeneous network resources ... RRP: $309.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Organic and Pervasive Computing -- ARCS 2004 Where is system architecture heading? The special interest group on Computer and Systems Architecture (Fachausschuss Rechner- und Systemarchitektur) of the German computer and information technology associations GI and ITG a-... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security and Cryptology - ICISC 2003 This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Active Networks This volume of the LNCS series contains the proceedings of the 5th Internat- nal Working Conference on Active Networks (IWAN 2003) held in the ancient cultural city of Kyoto, Japan. This year we received 73 submissions. The... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Watermarking We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Topics in Cryptology -- CT-RSA 2004 The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology -- INDOCRYPT 2003 TheINDOCRYPTconferenceseriesstartedin2000,andINDOCRYPT2003was the fourth one in this series. This series has been accepted by the international research community as a forum for presenting high-quality crypto research, as is... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT 2003 ASIACRYPT 2003 was held in Taipei, Taiwan, from Nov. 30 to Dec. 4, 2003. The 9th Annual ASIACRYPT conference was sponsored by the International Association for Cryptologic Research (IACR), this year in cooperation with the... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Computing. Programming Environments, Languages, Security, and Analysis of Systems The goal of the IST/FET proactive initiative on Global Computing is to - tain models, frameworks, methods, algorithms to build systems that are ?exible, dependable, secure, robust and e?cient. The dominant concerns are those of... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Job Scheduling Strategies for Parallel Processing This volume contains the papers presented at the 9th workshopon Job Sched- ing Strategies for Parallel Processing, which was held in conjunction with HPDC12 and GGF8 in Seattle, Washington, on June 24, 2003. The papers went... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy Enhancing Technologies PET 2003 was the 3rd Workshop on Privacy Enhancing Technologies. It all startedin2000withHannesFederrathorganizing"DesigningPrivacyEnhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability," July 25-26,... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Ad-Hoc, Mobile, and Wireless Networks AdHoc Networks are wireless, self-organizing systems formed by co-operating nodes, within communication range of each other which form temporary n- works. Their topology is dynamic, decentralized, and ever-changing, and the... RRP: $116.00 Add to Cart The item has been added