This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...
Continue readingThis book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic ...
Continue readingAdaptive Voltage Control in Power Systems, a self-contained blend of theory and novel application, is an in-depth treatment ...
Continue readingThis volume comprises the proceedings of the 4th Conference on Advanced En-cryption Standard, ‘AES — State of the Crypto ...
Continue readingThis volume contains the revised lecture notes corresponding to nine of thelecture courses presented at the 5th International ...
Continue readingThe book presents new optimization algorithms designed to improve the efficiency of tool paths for five-axis NC machining ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
Continue readingEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Continue readingThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue readingThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue readingSecurity systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue readingThe articles in this volume are devoted to: - moduli of coherent sheaves. - principal bundles and sheaves and their moduli. - ...
Continue readingThis book teaches the principles of natural language processing, first covering linguistics issues such as encoding, entropy, ...
Continue readingThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Continue readingSpace frames provide a lightweight solution to the problem of creating large span enclosures free from obstructions. They ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingDespite their enormous bulk and complexity of architecture, plants make up only around a quarter of a million of the 8 million ...
Continue readingThe “Atlas Effectors of Anti-Tumor Immunity” is a unique scientific publication, which includes major issues of up-to-date ...
Continue reading