This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...
WeiterlesenThis book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic ...
WeiterlesenAdaptive Voltage Control in Power Systems, a self-contained blend of theory and novel application, is an in-depth treatment ...
WeiterlesenThis volume comprises the proceedings of the 4th Conference on Advanced En-cryption Standard, ‘AES — State of the Crypto ...
WeiterlesenThis volume contains the revised lecture notes corresponding to nine of thelecture courses presented at the 5th International ...
WeiterlesenThe book presents new optimization algorithms designed to improve the efficiency of tool paths for five-axis NC machining ...
WeiterlesenThis book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
WeiterlesenEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
WeiterlesenThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
WeiterlesenThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
WeiterlesenThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
WeiterlesenSecurity systems have become an integral part of the building and large complex setups, and intervention of the computational ...
WeiterlesenThe articles in this volume are devoted to: - moduli of coherent sheaves. - principal bundles and sheaves and their moduli. - ...
WeiterlesenThis book teaches the principles of natural language processing, first covering linguistics issues such as encoding, entropy, ...
WeiterlesenThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
WeiterlesenSpace frames provide a lightweight solution to the problem of creating large span enclosures free from obstructions. They ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenDespite their enormous bulk and complexity of architecture, plants make up only around a quarter of a million of the 8 million ...
WeiterlesenThe “Atlas Effectors of Anti-Tumor Immunity” is a unique scientific publication, which includes major issues of up-to-date ...
Weiterlesen