This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
WeiterlesenThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
WeiterlesenThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
WeiterlesenConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
WeiterlesenThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
WeiterlesenThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
WeiterlesenThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThe project management profession continues to grow and mature, but is at risk of excluding those who don’t fit the mould. ...
WeiterlesenThe goal of this volume is to prove that mixed utterances in young bilinguals can be analyzed in the same way as adult code-switching. ...
WeiterlesenThis book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
WeiterlesenThis book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...
WeiterlesenThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
WeiterlesenThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
WeiterlesenThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
WeiterlesenThe concepts and theories of knowledge management and networks are meanwhile well documented. Yet there are few, if any, ...
WeiterlesenFast-paced, thorough introduction to programming with Python will have you writing code, solving problems, and making cool ...
Weiterlesentopics in Heterocyclic Chemistry presents critical accounts of heterocyclic com-pounds (cyclic compounds containing at least ...
WeiterlesenInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Weiterlesen