This book presented numerous submissions for inclusion in the book. The papers are organized in topical sections on nonlinear ...
WeiterlesenThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
WeiterlesenThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
WeiterlesenThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
WeiterlesenThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
WeiterlesenThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
WeiterlesenThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
WeiterlesenThis volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
WeiterlesenBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
WeiterlesenIn this volume, the expression of specific adhesion molecules within human cancer tissues are highlighted. The expression ...
WeiterlesenThis book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...
WeiterlesenThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Weiterlesen