In his last work, "Crisis of the European Sciences and Transcendental Phenomenology", Edmund Husserl formulated a radical ...
اقرأ المزيدThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيدThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
اقرأ المزيدThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
اقرأ المزيدReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
اقرأ المزيدthis book explores the applications of Critical Pedagogy to actual classroom situations. Written in a straight-forward, concise, ...
اقرأ المزيدIn an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
اقرأ المزيدThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
اقرأ المزيدBorder regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
اقرأ المزيدInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
اقرأ المزيدRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
اقرأ المزيدThis book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
اقرأ المزيد