 
                This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI ...
اقرأ المزيد 
                The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيد 
                The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيد 
                The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيد 
                The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, ...
اقرأ المزيد 
                This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
اقرأ المزيد 
                This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients ...
اقرأ المزيد 
                In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 8th International Conference on Cellular Automata for Research and ...
اقرأ المزيد 
                Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...
اقرأ المزيد 
                This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
اقرأ المزيد 
                Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
اقرأ المزيد 
                Scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
اقرأ المزيد 
                Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research ...
اقرأ المزيد 
                This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
اقرأ المزيد 
                As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
اقرأ المزيد 
                This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
اقرأ المزيد 
                This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد 
                This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد