This book presented numerous submissions for inclusion in the book. The papers are organized in topical sections on nonlinear ...
اقرأ المزيدThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
اقرأ المزيدThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
اقرأ المزيدThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
اقرأ المزيدThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
اقرأ المزيدThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
اقرأ المزيدThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
اقرأ المزيدThis volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
اقرأ المزيدBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدIn this volume, the expression of specific adhesion molecules within human cancer tissues are highlighted. The expression ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...
اقرأ المزيدThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد