This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
اقرأ المزيد
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
اقرأ المزيدJuniorCoders is an innovative educational platform designed to introduce programming and robotics concepts to kids and beginners. ...
اقرأ المزيدThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
اقرأ المزيد
In Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
اقرأ المزيد
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
اقرأ المزيد
This book focuses on the development of methods, interoperable and integrated ICT tools, and survey techniques for optimal ...
اقرأ المزيدGives a detailed description of the integration of blockchain technology for Electronic Health Records and provides the research ...
اقرأ المزيد
This Pivot demonstrates how a variety of technologies act as innovation catalysts within the banking and financial services ...
اقرأ المزيد
This book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, ...
اقرأ المزيد
Covers state of the art topics including user modeling for e-learning systems and cloud, IOT, and mobile-based frameworks. ...
اقرأ المزيد
This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...
اقرأ المزيد
This book introduces readers to the Solidity language from scratch, together with case studies and examples. It also covers ...
اقرأ المزيد
It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
اقرأ المزيد
It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
اقرأ المزيد
The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
اقرأ المزيد