This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...
اقرأ المزيدThe QOS evaluating model for computational grid nodes put forward can help greatly improving the self-adaptability of resource ...
اقرأ المزيدThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
اقرأ المزيدThis manual will help oral implantologists to understand the principles that underlie the use of basal implants as a means ...
اقرأ المزيدProvides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain ...
اقرأ المزيدThe book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيدThis collection of papers offers real-life application experiences, research results and methodological proposals of direct ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
اقرأ المزيدThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيدThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
اقرأ المزيدFor 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
اقرأ المزيدLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
اقرأ المزيدConstitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
اقرأ المزيدThis classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
اقرأ المزيدThe ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and ...
اقرأ المزيد