Electronic Books

Total Books: 521 - 540 /1403
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Weiterlesen
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Weiterlesen
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

Weiterlesen
Feasibility studies : an architect's guide / Peter Farrall

Details the benefits of a feasibility study. Once you’ve secured the commission, how do you ensure you’re following current ...

Weiterlesen
Federated AI for Real-World Business Scenarios / Dinesh C. Verma

Real-world AI applications frequently have training data distributed in many different locations, with data at different ...

Weiterlesen
NoIMG
Feminist IR in Europe : Knowledge Production in Academic Institutions

The aim of this book is to take stock of, critically engage, and celebrate feminist IR scholarship produced in Europe. Organized ...

Weiterlesen
Field and Service Robotics (vol. # 25)

Field robots are robots which operate in outdoor, complex, and dynamic environments. Service robots are those that work closely ...

Weiterlesen
Fifth Ifip International Conference On Theoretical Computer Science - Tcs 2008

Includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...

Weiterlesen
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Weiterlesen
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Weiterlesen
Fighting Terror Online : The Convergence of Security, Technology, and the Law

This book presents the position that the online environment is a significant and relevant theater of activity in the fight ...

Weiterlesen
Filoviruses : A Compendium of 40 Years of Epidemiological, Clinical, and Laboratory Studies

This book summarizes in detail the contemporary knowledge of filoviruses and diseases they cause. Almost the entirety of ...

Weiterlesen
Financial Compensation for Victims of Catastrophes

Some countries have created a specific fund solution; others follow a generous ad hoc approach whereby large amounts of compensation ...

Weiterlesen
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Weiterlesen
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Weiterlesen
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Weiterlesen
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Weiterlesen
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

Weiterlesen
Total Books: 521 - 540 /1403