This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
اقرأ المزيد
The series of International Symposia on Spatial Data Handling started in Zurich, Switzerland, in 1984. Since then it has ...
اقرأ المزيد
This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
The project management profession continues to grow and mature, but is at risk of excluding those who don’t fit the mould. ...
اقرأ المزيد
The goal of this volume is to prove that mixed utterances in young bilinguals can be analyzed in the same way as adult code-switching. ...
اقرأ المزيد
This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
اقرأ المزيد
This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...
اقرأ المزيد
This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
اقرأ المزيد
Psychoacoustics – Facts and Models offers a unique, comprehensive summary of information describing the processing of sound ...
اقرأ المزيد
PTSD, pain syndromes, traumatic brain injury: these three areas are common features of personal injury cases, often forming ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
اقرأ المزيد
This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيد
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيد
The concepts and theories of knowledge management and networks are meanwhile well documented. Yet there are few, if any, ...
اقرأ المزيد
Fast-paced, thorough introduction to programming with Python will have you writing code, solving problems, and making cool ...
اقرأ المزيد
topics in Heterocyclic Chemistry presents critical accounts of heterocyclic com-pounds (cyclic compounds containing at least ...
اقرأ المزيد
Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
اقرأ المزيد
Quality of Telephone-Based Spoken Dialogue Systems is a systematic overview of assessment, evaluation, and prediction methods ...
اقرأ المزيد