The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
اقرأ المزيدCryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
اقرأ المزيدThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدOffers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
اقرأ المزيدCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيدCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيدThis book explores the new complexities and ambiguities that epitomize EU-Turkey relations. With a strong focus on the developments ...
اقرأ المزيدThe economics of sustainability is much more complex than the neoclassical (Newtonian) economic approach to economic efficiency. ...
اقرأ المزيدThis volume analyzes the economic, social, and political challenges that emerging states confront today. Notwithstanding ...
اقرأ المزيدThis book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...
اقرأ المزيدThis open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering ...
اقرأ المزيدConstitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
اقرأ المزيدThe 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This volume, ...
اقرأ المزيدGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيدwe give an overview of the book and the RRI-Practice study. The book is an analysis of data collected in the RRI-Practice ...
اقرأ المزيدThis volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
اقرأ المزيد