This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
اقرأ المزيدSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
اقرأ المزيدContributors to this new book are leaders in the field of diapause studies, and many authors were participants at a recent ...
اقرأ المزيدWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
اقرأ المزيدIWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
اقرأ المزيدAdvice about how to achieve a PhD usually falls short of relevance because the ways of creating and reporting knowledge differ ...
اقرأ المزيدThe aim of this book is to describe an efficient procedure to model dynamical contact problems with friction. This procedure ...
اقرأ المزيدVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيدVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيدLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
اقرأ المزيدThis book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
اقرأ المزيدConstitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
اقرأ المزيدThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
اقرأ المزيدThis volume presents a collection of papers on the enticing and complex theme of Ergativity. The papers exemplify theoretical ...
اقرأ المزيد