by
Lin, Xiaodong. author.
Format:
Electronic Resources
Excerpt:
Computer security.
by
Hong, Richang. editor.
Format:
Electronic Resources
Excerpt:
Computer security.
View Other Search Results
by
Hong, Richang. editor.
Format:
Electronic Resources
Excerpt:
Computer security.
by
Zeng, Bing. editor.
Format:
Electronic Resources
Excerpt:
Computer security.
by
Zeng, Bing. editor.
Format:
Electronic Resources
Excerpt:
Computer security.
by
Hong, Richang. editor.
Format:
Electronic Resources
Excerpt:
Computer security.
by
Cham, Tat-Jen. editor.
Format:
Electronic Resources
Excerpt:
-- Content II -- Applications II -- Computer Vision II -- Image Processing II -- Multimedia Signal Processing
by
Shoniregun, Charles A. author.
Format:
Electronic Resources
Excerpt:
security they offer. With the need to combat the problems related to identity theft and other security
by
SpringerLink (Online service)
Format:
Electronic Resources
Excerpt:
.....). Encryption of visual data is an important topic in the area of mutimedia security, applications range from
by
Park, James J. (Jong Hyuk). editor.
Format:
Electronic Resources
Excerpt:
web, human-centric computing and social networks, adaptive and context-aware computing, security and
by
Frye, Douglas W. author.
Format:
Electronic Resources
Excerpt:
forwards an organization's goals. Network Security Policies and Procedures is designed for practitioners
by
Vielhauer, Claus. author.
Format:
Electronic Resources
Excerpt:
keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting
Limit Search Results
Narrowed by: