This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.
This book explores where usability techniques and HCD knowledge should be considered in the existing software development lifecycle. It also offers a systematic approach for the adoption, assessment and deployment of usability engineering methods.
Addressing advanced issues of digital preservation, beyond keeping the bits and the ability to render, this book explores concepts of understandability, usability and interoperability for digital objects, as well as concerns over issues such as authenticity.
This book covers advanced topics in computer graphics that are important in the areas of game development, three-dimensional animation and real-time rendering, among them skeletal animation, quaternions, mesh processing and collision detection.
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.