Brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence ...
Continue readingshows readers a path to improve their project delivery via the application of lean concepts and process management. Authors ...
Continue readingThe three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
Continue readingThis book addresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems ...
Continue readingAdresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they ...
Continue readingFocuses on the relevance of non-fungible token-based products in the current hyper-digitalized and hyper-connected world. ...
Continue readingThis monograph proposes how to manage complexity by organizing the system as a State Tree Structure (STS). an efficient recursive ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Conference on Principles and Practice of Constraint ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThe aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...
Continue readingWhile addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Continue readingFeatures state-of-the-art studies on the responsible innovation management. It illustrates the innovative methods from socio-economic ...
Continue readingUp to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
Continue readingWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue reading" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue readingThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue readingThis volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Continue readingThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue readingSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue reading