This book presented numerous submissions for inclusion in the book. The papers are organized in topical sections on nonlinear ...
Continue readingThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Continue readingThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Continue readingThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue readingThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
Continue readingThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
Continue readingThis volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
Continue readingBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Continue readingIn this volume, the expression of specific adhesion molecules within human cancer tissues are highlighted. The expression ...
Continue readingThis book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading