This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
WeiterlesenSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
WeiterlesenDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
WeiterlesenContributors to this new book are leaders in the field of diapause studies, and many authors were participants at a recent ...
WeiterlesenWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
WeiterlesenIWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
WeiterlesenAdvice about how to achieve a PhD usually falls short of relevance because the ways of creating and reporting knowledge differ ...
WeiterlesenThe aim of this book is to describe an efficient procedure to model dynamical contact problems with friction. This procedure ...
WeiterlesenVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
WeiterlesenVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
WeiterlesenLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
WeiterlesenThis book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
WeiterlesenConstitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
WeiterlesenThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
WeiterlesenThis volume presents a collection of papers on the enticing and complex theme of Ergativity. The papers exemplify theoretical ...
Weiterlesen