Electronic Books

Total Books: 1 - 20 /41
Advanced Encryption Standard - AES

This volume comprises the proceedings of the 4th Conference on Advanced En-cryption Standard, ‘AES — State of the Crypto ...

Weiterlesen
Advanced Functional Programming

This volume contains the revised lecture notes corresponding to nine of thelecture courses presented at the 5th International ...

Weiterlesen
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

Weiterlesen
Advances in Cryptology -- ASIACRYPT 2006

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...

Weiterlesen
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

Weiterlesen
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

Weiterlesen
Advancing Computational Intelligence Techniques for Security Systems Design / Ozzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan

Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...

Weiterlesen
Central European Functional Programming School

This volume presents eight carefully revised texts of selected lectures given by leading researchers of the field at the ...

Weiterlesen
Computational Methods for Nanoscale Applications

Computational Methods for Nanoscale Applications: Particles, Plasmons and Waves presents new perspectives on modern nanoscale ...

Weiterlesen
Computer Algebra in Scientific Computing

This book constitutes the refereed proceedings of the 22nd International Workshop on Computer Algebra in Scientific Computing, ...

Weiterlesen
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Weiterlesen
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Weiterlesen
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Weiterlesen
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Weiterlesen
Evaluating the Employment Effects of Job Creation Schemes in Germany

This book analyses the employment effects of job creation schemes for the participating individuals in Germany. Programmes ...

Weiterlesen
Flux-Corrected Transport

Addressing students and researchers as well as CFD practitioners, this book describes the state of the art in the development ...

Weiterlesen
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Weiterlesen
Total Books: 1 - 20 /41