In his last work, "Crisis of the European Sciences and Transcendental Phenomenology", Edmund Husserl formulated a radical ...
WeiterlesenThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
WeiterlesenThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
WeiterlesenThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
WeiterlesenReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
Weiterlesenthis book explores the applications of Critical Pedagogy to actual classroom situations. Written in a straight-forward, concise, ...
WeiterlesenIn an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
WeiterlesenThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
WeiterlesenBorder regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
WeiterlesenInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
WeiterlesenRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
WeiterlesenThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
WeiterlesenThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
WeiterlesenThis book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
Weiterlesen