Explores the syntactical constructs of the most common programming languages, and sheds a mathematical light on their semantics, ...
Continue readingCooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques ...
Continue readingMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Continue readingRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingConstitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...
Continue readingThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Continue readingThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Continue readingIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Continue readingIt is evidence of how well the interdisciplinary nature of the conference has truly matured that the major criterion of quality, ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 12th International Meeting on DNA Computing, DNA12, ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 13th International Meeting on DNA Computing, DNA 13, ...
Continue readingThis book helps practitioners gain a deeper understanding, at an applied level, of the issues involved in improving data ...
Continue readingThis book helps practitioners gain a deeper understanding, at an applied level, of the issues involved in improving data ...
Continue readingData Stream Mining and Resource Adaptive Computation.- Purpose Based Access Control for Privacy Protection in Database Systems.- ...
Continue readingShows how Big Data change reality and, hence, the way we deal with the city. They demonstrate how the Lab interprets digital ...
Continue readingThis edited book is devoted specifically to the applications of complex nonlinear dynamic phenomena to real systems and device ...
Continue readingDigital Satellite Communications focuses on the study and design of efficient and flexible physical layers for broadband ...
Continue reading