Brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence ...
اقرأ المزيد
shows readers a path to improve their project delivery via the application of lean concepts and process management. Authors ...
اقرأ المزيد
The three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
اقرأ المزيدThis book addresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems ...
اقرأ المزيد
Adresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they ...
اقرأ المزيد
Focuses on the relevance of non-fungible token-based products in the current hyper-digitalized and hyper-connected world. ...
اقرأ المزيد
This monograph proposes how to manage complexity by organizing the system as a State Tree Structure (STS). an efficient recursive ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 14th International Conference on Principles and Practice of Constraint ...
اقرأ المزيد
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيد
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThe aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...
اقرأ المزيد
While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
اقرأ المزيد
Features state-of-the-art studies on the responsible innovation management. It illustrates the innovative methods from socio-economic ...
اقرأ المزيد
Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
اقرأ المزيد
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
اقرأ المزيد
" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
اقرأ المزيد
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
اقرأ المزيد
This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
اقرأ المزيد
These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
اقرأ المزيد
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
اقرأ المزيد