Search results
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 3: Communication Risk and Assurance II > 83-93
Communications in Computer and Information Science > e-Technologies and Networks for Development > Others > 285-297
Lecture Notes in Computer Science > Transactions on Large-Scale Data- and Knowledge-Centered Systems I > 191-210
Lecture Notes in Computer Science > Model Driven Engineering Languages and Systems > Model-Based Resource Management > 319-333
Lecture Notes in Computer Science > Grid Economics and Business Models > Research Projects on Business Modeling > 152-162
Lecture Notes in Computer Science > Computer Safety, Reliability, and Security > Keynote Papers > 5-11
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems > Information Technology Security > 3-12
Lecture Notes in Computer Science > Universal Access in Human-Computer Interaction. Applications and Services > Part IV: Universal Access to eServices > 893-902
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 211-227
Lecture Notes in Computer Science > Economics of Grids, Clouds, Systems, and Services > Session A: Service Evaluation and Trust > 1-15
Lecture Notes in Computer Science > Ethics and Policy of Biometrics > Ethical and Medical Concerns > 102-114
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security Modelling > 176-190
Lecture Notes in Computer Science > Computational Intelligence and Security > Information Processing and Intrusion Detection > 683-693