Limit Search Results
Author
Language
Format
Subject
56 Results Found Subscribe to search results
00000000000000000000000000000000000000000000000000000000MAIN
Print
2. 
Cover image for Prediction and recognition of piracy efforts using collaborative human-centric information systems
3. 
Cover image for Engineering dependable software systems
4. 
Cover image for Software agents, agent systems and their applications
5. 
Cover image for Safety and security engineering IV
7. 
Cover image for Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&IS 2010
8. 
Cover image for Radio frequency identification system security : rfidsec'10 asia workshop proceedings
9. 
Cover image for Human systems integration to enhance maritime domain awareness for port/parbour security
10. 
Cover image for Harbour protection through data fusion technologies
11. 
Cover image for Algorithms, architectures and information systems security
12. 
Cover image for Principles, systems and applications of IP telecommunications : services and security for next generation networks : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008 : revised selected papers
13. 
Cover image for Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedings
14. 
Cover image for Carbon nanomaterials in clean energy hydrogen systems
16. 
Cover image for Functionalized nanoscale materials, devices and systems
17. 
Cover image for Materials issues for generation IV systems : status, open questions and challenges
18. 
Cover image for Imaging for detection and identification
19. 
Cover image for Networks, security and soft computing : trends and future directions
20. 
Cover image for Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedings
21. 
Cover image for Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedings
22. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
23. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
24. 
Cover image for Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings
25. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
26. 
Cover image for Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
27. 
Cover image for Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
28. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
29. 
Cover image for Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers
30. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
32. 
Cover image for Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
33. 
Cover image for Security of water supply systems : from source to tap
34. 
Cover image for Verification of infinite-state systems with applications to security
35. 
Cover image for Security and embedded systems
36. 
Cover image for Effective nuclear regulatory systems : facing safety and security challenges : proceedings of an International  Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challenges
37. 
Cover image for Effective nuclear regulatory systems : facing safety and security challenges : proceedings of an International  Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challenges
38. 
Cover image for Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
39. 
Cover image for Safety and security engineering
41. 
Cover image for Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers
42. 
Cover image for Information systems security :  first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
44. 
Cover image for Integrity and internal control in Information Systems V : IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany
45. 
Cover image for Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings
46. 
Cover image for Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
49. 
Cover image for Multimedia systems and applications II
50. 
Cover image for Multimedia systems and applications
51. 
Cover image for Practical UNIX and Internet security
52. 
Cover image for Security and protection in information system
55. 
Cover image for Secure communication systems