Ability to use information and communication technologies (ICT) is an imperative for effective participation in today’s ...
اقرأ المزيدThis book summarizes the key findings from the second cycle of IEA’s International Computer and Information Literacy Study ...
اقرأ المزيدPresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
اقرأ المزيدThis book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...
اقرأ المزيدThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
اقرأ المزيدProcessor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because ...
اقرأ المزيدThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيدConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
اقرأ المزيدThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
اقرأ المزيدConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
اقرأ المزيدThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيدThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
اقرأ المزيدTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
اقرأ المزيدThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيدaddresses a wide variety of academic, administrative and leadership practices that are involved in quality work in higher ...
اقرأ المزيد