1
Published 2015
Table of Contents: ... for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective...
View full text
Electronic eBook
3
Published 2015
Table of Contents: ...: Chapter 25. A Secured Group-based Communication Scheme in Disaster Response Environment using Delay...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ...-Enterprise Collaboration Management -- Construction of Collaboration Structures -- Data Mining to Discover...
View full text
Electronic eBook
5
Published 2013
Table of Contents: ... Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...-2 to AVS Transcoding -- Persian Text Watermarking -- Three Dimensional Reconstruction of Structured...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Long Haul Networks -- MatPlanWDM: An Educational Tool for Network Planning in Wavelength-Routing...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ...-dimensional Queries Using Bitmap Indices -- Environmental Noise Classification for Multimedia Libraries...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... of Social Feedback on Communication Activity in Online Multiplayer Videogames -- Habitat Computing: Towards...
View full text
Electronic eBook
11
Published 2006
Table of Contents: ... and Online Purchase Behavior: An Empirical Exploration -- P2P Users: Important dimensions for changing...
View full text
Electronic eBook