Electronic Books

Total Books: 101 - 120 /127
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Weiterlesen
Security in Ad-hoc and Sensor Networks

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, ...

Weiterlesen
NoIMG
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves

This book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...

Weiterlesen
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Weiterlesen
Selected Areas in Cryptography (vol. # 3897)

This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...

Weiterlesen
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

Weiterlesen
Selected Areas in Cryptography ; 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...

Weiterlesen
Simplified Facial Rejuvenation

Simplified Facial Rejuvenation is divided into sections that include anatomy and anesthesia, classifications, dermatologic ...

Weiterlesen
Skin Aging

The topic of skin aging is of growing importance to all working in the field of dermatology, aesthetic medicine and cosmetic ...

Weiterlesen
Smile Design Integrating Esthetics and Function: Essentials in Esthetic Dentistry / Jonathan B Levine, Brian J Millar

Smile Design ; Psychological factors ; Integration of function and esthetics Techniques ; Photography ; Periodontal factors ...

Weiterlesen
Symmetry Rules : How Science and Nature are founded on Symmetry

When we use science to describe and understand the world around us, we are in essence grasping nature through symmetry. In ...

Weiterlesen
Taste: Media and Interior Design / Karin Tehve

Traces and explores the evolution of taste from a design perspective: what it is, how it works, and what it does. Examines ...

Weiterlesen
The Enigma of Good and Evil: The Moral Sentiment in Literature

At the roots of these questions lies human experience which ought to be appropriately clarified before entering into speculative ...

Weiterlesen
The Limits of Art On Borderline Cases of Artworks and their Aesthetic Properties

This book is about exploring interesting borderline cases of art. It discusses the cases of gustatory and olfactory artworks ...

Weiterlesen
The Resistant Object of Architecture : A Lacanian Perspective / Petra Čeferin

Focuses on the question "what is architecture?," and responds to this question by developing the immanent structural logic ...

Weiterlesen
NoIMG
The eyes of the skin : architecture and the senses / Juhani Pallasmaa

It asks the far-reaching question why, when there are five senses, has one single sense – sight – become so predominant ...

Weiterlesen
Theatre as a Medium for Children and Young People: Images and Observations

This book is a journey into the dual territory of educational and theatrical settings. It advances the knowledge in these ...

Weiterlesen
Theories of Perception in Medieval and Early Modern Philosophy

Sense perception is one of the classical themes in philosophy. It is traditionally considered a necessary preamble to many ...

Weiterlesen
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Weiterlesen
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Weiterlesen
Total Books: 101 - 120 /127