Ability to use information and communication technologies (ICT) is an imperative for effective participation in today’s ...
WeiterlesenThis book summarizes the key findings from the second cycle of IEA’s International Computer and Information Literacy Study ...
WeiterlesenPresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
WeiterlesenThis book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...
WeiterlesenThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
WeiterlesenProcessor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because ...
WeiterlesenThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
WeiterlesenConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
WeiterlesenThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
WeiterlesenThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
WeiterlesenThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
WeiterlesenThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
WeiterlesenConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
WeiterlesenThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
WeiterlesenThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
WeiterlesenTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
WeiterlesenThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Weiterlesenaddresses a wide variety of academic, administrative and leadership practices that are involved in quality work in higher ...
Weiterlesen