The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Continue readingA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Continue readingThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingModern macroeconomics suffers from an unclear link between short-term Keynesian analysis and long-term growth modelling. ...
Continue readingModern macroeconomics suffers from an unclear link between short-term Keynesian analysis and long-term growth modelling. ...
Continue readingThe motivation of this survey is to review companies’ internationalisation procedures from a logistics perspective. What ...
Continue readingThis volume creates an interdisciplinary forum for contemporary Turkey research in Germany. It presents research results ...
Continue readingThis methodological book summarises existing analysing techniques using data from PIAAC, a study initiated by the OECD that ...
Continue readingThe selection of good performance indicators is not an easy process. This monograph focuses on the designing of a Performance ...
Continue readingThis third and last volume in the series takes the perspective of non-EU countries on immigrant social protection. By focusing ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingHaving the high unemployment in Germany in mind, this book discusses how macroeconomic theory has evolved over the past forty ...
Continue readingMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Continue readingThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Continue readingThe purpose of this volume is to present a comprehensive overview of recent advances in primate field research, ecology, ...
Continue readingThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue readingSpecial functions and orthogonal polynomials in particular have been around for centuries. Can you imagine mathematics without ...
Continue readingSpecial functions and orthogonal polynomials in particular have been around for centuries. Can you imagine mathematics without ...
Continue reading