This paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
WeiterlesenThis book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
WeiterlesenThis book addresses all issues relevant to error prevention and safe practice in the acute and emergency health-care setting. ...
WeiterlesenThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
WeiterlesenThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
WeiterlesenThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
WeiterlesenThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
WeiterlesenThis volume is divided into three sections: the first one describes the nature of the component disciplines of STEM. The ...
WeiterlesenCryogenic refrigerators operating with refrigerant mixtures were developed under classified and proprietary programs for ...
WeiterlesenRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
WeiterlesenExplores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
WeiterlesenCryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
WeiterlesenConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
WeiterlesenThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
WeiterlesenModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
WeiterlesenThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
Weiterlesen