This volume aims to describe a variety of techniques that reflects the wide range of research currently performed in the ...
اقرأ المزيدAims to describe a variety of techniques that reflects the wide range of research currently performed in the field of coronavirology, ...
اقرأ المزيدCSR, a concept aimed at determining the amount of responsibilities to be shouldered by private business toward stakeholder ...
اقرأ المزيدBuilding better organisations, with a clear sense of purpose, is a common challenge faced by many entrepreneurs and executives ...
اقرأ المزيدThis book is published open access under a CC BY 3.0 IGO license. This open access book provides methods for the estimation ...
اقرأ المزيدThis volume brings together a group of higher education researchers across Europe and looks into the implementation of the ...
اقرأ المزيدThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
اقرأ المزيدThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
اقرأ المزيدIn an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
اقرأ المزيدThis book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
اقرأ المزيدConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
اقرأ المزيدThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the 10th International Workshop on DNA Based Computers, ...
اقرأ المزيدThis book presents new developments in data analysis, classification and multivariate statistics, and in their algorithmic ...
اقرأ المزيد