الكتب الالكترونية

عدد الكتب: 21 - 40 /52
978-3-030-57348-5
Finite Elements III : First-Order and Time-Dependent PDEs

Volume III is divided into 28 chapters. The first eight chapters focus on the symmetric positive systems of first-order PDEs ...

اقرأ المزيد
978-3-540-31553-7
Hypoelliptic Estimates and Spectral Theory for Fokker-Planck Operators and Witten Laplacians

There has recently been a renewal of interest in Fokker-Planck operators, motivated by problems in statistical physics, in ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-79104-1
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-72163-5
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

اقرأ المزيد
978-3-540-69141-9
Intersections de deux quadriques et pinceaux de courbes de genre 1 = Intersections of two quadrics and pencils of curves of genus 1

This research monograph focuses on the arithmetic, over number fields, of surfaces fibred into curves of genus 1 over the ...

اقرأ المزيد
978-3-540-27692-0
Introduction to Modern Number Theory

"Introduction to Modern Number Theory" surveys from a unified point of view both the modern state and the trends of continuing ...

اقرأ المزيد
978-3-540-71641-9
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

اقرأ المزيد
978-0-387-68805-3
Numerical Approximation Methods for Elliptic Boundary Value Problems : Finite and Boundary Elements

Although the aim of this book is to give a unified introduction into finite and boundary element methods, the main focus ...

اقرأ المزيد
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

اقرأ المزيد
978-3-540-34462-9
Partial Differential Equations

This comprehensive two-volume textbook presents the whole area of Partial Differential Equations - of the elliptic, parabolic, ...

اقرأ المزيد
978-3-540-34462-9
Partial Differential Equations

This comprehensive two-volume textbook presents the whole area of Partial Differential Equations - of the elliptic, parabolic, ...

اقرأ المزيد
978-3-7643-7396-2
Perturbation Methods and Semilinear Elliptic Problems on R^n

The aim of this monograph is to discuss several elliptic problems on Rn with two main features: they are variational and ...

اقرأ المزيد
978-3-7643-7396-2
Perturbation Methods and Semilinear Elliptic Problems on R^n

The aim of this monograph is to discuss several elliptic problems on Rn with two main features: they are variational and ...

اقرأ المزيد
978-3-540-88403-3
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

اقرأ المزيد
978-0-387-28979-3
Prime Numbers

Prime numbers beckon to the beginner, as the basic notion of primality is accessible even to children. Yet, some of the simplest ...

اقرأ المزيد
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

اقرأ المزيد
978-3-540-49769-1
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
عدد الكتب: 21 - 40 /52