Computational Intelligence and Security [electronic resource] : International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II / edited by Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao.

Contributor(s): Hao, Yue [editor.] | Liu, Jiming [editor.] | Wang, Yu-Ping [editor.] | Cheung, Yiu-ming [editor.] | Yin, Hujun [editor.] | Jiao, Licheng [editor.] | Ma, Jianfeng [editor.] | Jiao, Yong-Chang [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 3802Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Description: XLII, 1166 p. Also available online. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540315988Subject(s): Computer science | Computer software | Information storage and retrieval systems | Information systems | Artificial intelligence | Information Systems | Computer Science | Artificial Intelligence (incl. Robotics) | Information Storage and Retrieval | Information Systems Applications (incl.Internet) | Computation by Abstract Devices | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 006.3 LOC classification: Q334-342TJ210.2-211.495Online resources: Click here to access online
Contents:
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK3531

Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha