The book is aimed at researchers and government policy makers who wish to keep abreast of the most recent developments in ...
اقرأ المزيدThis book is the result of the Proceedings of the NATO Advanced Research Workshop on Air, Water and Soil Quality Modelling ...
اقرأ المزيدThis volume contains the lectures and seminars given at the NATO Advanced Study Institute on “Sensor Systems for Biological ...
اقرأ المزيدThe Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology ...
اقرأ المزيدThis book presented sections on mobility and sensing, applications of AmI, activity and location sensing, AmI and artificial ...
اقرأ المزيدThis book presented sections on mobility and sensing, applications of AmI, activity and location sensing, AmI and artificial ...
اقرأ المزيدThis volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe16thIFIP/IEEEInternationalWorkshop ...
اقرأ المزيدproposes a framework for assessing countries’ levels of compliance with international space law and norms. It begins by ...
اقرأ المزيدThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
اقرأ المزيدDiscusses existing conventional radio frequency (RF)-based wireless access technology and presents the challenges that can ...
اقرأ المزيدThe goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
اقرأ المزيدThe goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
اقرأ المزيدMS is continuously developing as one of the most re- able analytical method for elucidating the structure of molecules originating ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
اقرأ المزيد