This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
WeiterlesenThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
WeiterlesenConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenThis book follows the development of the Building Resilience in Teacher Education (BRiTE) project across Australia and internationally. ...
WeiterlesenThis book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
WeiterlesenThe chapters selected for this book consist of studies in which culture has been either the object, or the structuring principle ...
WeiterlesenCurcumin is a natural product with polyphenolic structure. It is used in therapeutic remedies alone or in combination with ...
WeiterlesenThe papers collected in this volume represent some of the finest recent work by political philosophers and political theorists ...
WeiterlesenThe present volume originated in 2001 when we, together with our publishing editors at (then) Kluwer Academic Publishers, ...
WeiterlesenRecent advances in technology, materials, and equipment have changed the way endodontics is practiced today, thereby facilitating ...
WeiterlesenThis survey on the modernity of ethnomathematics addresses numerous themes related to both ethnomathematics and mathematics ...
WeiterlesenThe development of product innovations is permanently challenged by the customers’ rapidly evolving demand for new products ...
WeiterlesenJanine Frauendorf analyzes how customer processes can be used to optimize the overall service process. In this context, the ...
WeiterlesenCovers important concepts in service design and delivery including customer experiences, peer-to-peer services, the organization’s ...
WeiterlesenThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
WeiterlesenThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
WeiterlesenThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
WeiterlesenThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
WeiterlesenThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
Weiterlesen