This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...
Continue readingThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue readingConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThese proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...
Continue readingThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
Continue readingTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingThis book is Using many examples to illustrate the different techniques useful for formulating models, this text beautifully ...
Continue readingBy virtue of their special algebraic structures, Pythagorean-hodograph (PH) curves offer unique advantages for computer-aided ...
Continue readingAugment your knowledge of Python with this entertaining learning guide, which features 100 exercises and programming puzzles ...
Continue readingFast-paced, thorough introduction to programming with Python will have you writing code, solving problems, and making cool ...
Continue readingDelivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...
Continue readingDieses Buch bringt Einsteigern anhand einzelner abgeschlossener Lerneinheiten das Programmieren mit Python bei. Es zeigt ...
Continue readingQoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its ...
Continue readingThis volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes ...
Continue readingInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Continue readingThis book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...
Continue reading