Isaac Agudo - Böcker
Visar alla böcker från författaren Isaac Agudo. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Trust Management VII
7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings
Inbunden, Engelska, 2013
550 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
Trust Management VII
7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings
Häftad, Engelska, 2015
550 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
Public Key Infrastructures, Services and Applications
10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
Häftad, Engelska, 2014
507 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.