This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
اقرأ المزيد
The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
اقرأ المزيد
This book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
اقرأ المزيد
This edition guides the reader through successful planning and implementation of a thesis project and provides students in ...
اقرأ المزيد
Time Series Analysis and Its Applications, Second Edition, presents a balanced and comprehensive treatment of both time and ...
اقرأ المزيد
The book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
اقرأ المزيد
This two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيد
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
اقرأ المزيد
This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction ...
اقرأ المزيد
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيد
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيد
This book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
اقرأ المزيد
Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
اقرأ المزيد
this volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
اقرأ المزيد
This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
اقرأ المزيد