Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006
| Main Author: | Camenisch, Jan (Author) |
|---|---|
| Corporate Authors: | IH 2006 (2006 : Alexandria, Va.), Information Hiding Conference (8th : 2006 : Alexandria, Virginia, USA) |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4437 |
| Subjects: |
Similar Items
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Enterprise information systems 8th International Conference, ICEIS 2006, Pahpos, Cyprus, May 23-27, 2006 : revised selected papers
by: Manolopoulos, Yannis 1957-
Published: (2008)
by: Manolopoulos, Yannis 1957-
Published: (2008)
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Information security management handbook Volume 4
Web information systems and technologies International Conferences, WEBIST 2005 and WEBIST 2006 revised selected papers
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Working paper workshop on derivatives fundamental in banking and finance
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Computers and games 5th international conference, CG 2006, Turin, Italy, May 29-31, 2006: revised papers
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Databases and information systems IV selected papers from the Seventh International Baltic Conference, DB&IS'2006
by: Caplinskas, Albertas, et al.
Published: (2007)
by: Caplinskas, Albertas, et al.
Published: (2007)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
New foundations for Asian and Pacific security based on the addresses, papers, reports, and discussion sessions of an international conference held at Pattaya, Thailand, December 12-16, 1979
by: Larson, Joyce E.
Published: (1980)
by: Larson, Joyce E.
Published: (1980)
Statistical network analysis models, issues, and new directions ICML 2006 Workshop on Statistical Network Analysis, Pittsburgh, PA, USA, June 29, 2006 revised selected papers
by: Airoldi, Edoardo
Published: (2007)
by: Airoldi, Edoardo
Published: (2007)
Chemistry of crop protection : progress and prospects in science and regulation
by: Ramos, G., et al.
Published: (2003)
by: Ramos, G., et al.
Published: (2003)
Managing modern organizations with information technology 2005 Information Resources Management Association, International Conference, San Diego, California, USA, May 5-18, 2005
by: Khosrowpour, Mehdi 1951-
Published: (2005)
by: Khosrowpour, Mehdi 1951-
Published: (2005)
Proceedings of the 11th Italian Conference on Sensors and Microsystems, Lecce, Italy, 8-10 February 2006
by: Siciliano, P. (Pietro)
Published: (2008)
by: Siciliano, P. (Pietro)
Published: (2008)
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019)
by: Mahyuddin Daud
Published: (2019)
Evaluation of multilingual and multi-modal information retrieval : 7th Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 20-22, 2006 : revised selected papers
by: Peters, Carol , 1947-
Published: (2007)
by: Peters, Carol , 1947-
Published: (2007)
How to secure and audit Oracle 10g and 11g
by: Ben-Natan, Ron
Published: (2009)
by: Ben-Natan, Ron
Published: (2009)
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Multimedia content analysis and mining international workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007 proceedings
by: Sebe, Nicu
Published: (2007)
by: Sebe, Nicu
Published: (2007)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Computational modelling of objects represented in images fundamentals, methods and applications proceedings of the International Symposium CompIMAGE 2006, Coimbra, Portugal, 20-21 October 2006
by: Jorge, Renato M. Natal, et al.
Published: (2007)
by: Jorge, Renato M. Natal, et al.
Published: (2007)
Algorithms and data structures 10th international workshop, WADS 2007, Halifax, Canada, August 15-17, 2007 proceedings
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Similar Items
-
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013) -
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007) -
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007) -
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007) -
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)