1
2
Linawati.
2014
Table of Contents:
“... -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems...”2014
Full text
3
4