This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
اقرأ المزيدSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
اقرأ المزيد
Contributors to this new book are leaders in the field of diapause studies, and many authors were participants at a recent ...
اقرأ المزيد
We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
اقرأ المزيد
IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
اقرأ المزيد
Advice about how to achieve a PhD usually falls short of relevance because the ways of creating and reporting knowledge differ ...
اقرأ المزيدThe aim of this book is to describe an efficient procedure to model dynamical contact problems with friction. This procedure ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
اقرأ المزيد
This book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
اقرأ المزيد
Constitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
اقرأ المزيد
The delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
اقرأ المزيد
This volume presents a collection of papers on the enticing and complex theme of Ergativity. The papers exemplify theoretical ...
اقرأ المزيد