This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Continue readingAntibody therapeutics are the treatment of choice for several autoimmune and oncological conditions and are becoming the ...
Continue readingThe chapters focus on recent advances in the field including novel biomarkers and the microbiome, genomics of cardiovascular ...
Continue readingThis edition guides the reader through successful planning and implementation of a thesis project and provides students in ...
Continue readingAims to expand the discussion about thin places, how they work and why they are important. It explores the origins and characteristics ...
Continue readingThis book has been written in a clear scientific way summarising the current understanding of two major aortic complications: ...
Continue readingTime Series Analysis and Its Applications, Second Edition, presents a balanced and comprehensive treatment of both time and ...
Continue readingThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Continue readingToll-like receptors (TLRs) are critical mediators of the innate immune response in mammals. This family of receptors recognizes ...
Continue readingThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Continue readingTo support application developers in the various tasks involved in this process, several different tools need to be at his ...
Continue readingReviews the evidence relating to the mechanisms, clinical efficacy, safety/toxicity, and clinical application of tooth whitening ...
Continue readingThis book presents topics in applied dynamic macrotheory for closed and open economies. The authors give an advanced treatment ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Continue reading