Ability to use information and communication technologies (ICT) is an imperative for effective participation in today’s ...
Continue readingThis book summarizes the key findings from the second cycle of IEA’s International Computer and Information Literacy Study ...
Continue readingPresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
Continue readingThis book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...
Continue readingThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Continue readingProcessor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because ...
Continue readingConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Continue readingThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Continue readingConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
Continue readingTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingaddresses a wide variety of academic, administrative and leadership practices that are involved in quality work in higher ...
Continue readingQueuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...
Continue readingthe book focuses on multiple-antenna orthogonal frequency division multiplexing (MIMO OFDM), which will be applied as basis ...
Continue reading