Brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence ...
Continue reading
shows readers a path to improve their project delivery via the application of lean concepts and process management. Authors ...
Continue reading
The three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
Continue readingThis book addresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems ...
Continue reading
Adresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they ...
Continue reading
Focuses on the relevance of non-fungible token-based products in the current hyper-digitalized and hyper-connected world. ...
Continue reading
This monograph proposes how to manage complexity by organizing the system as a State Tree Structure (STS). an efficient recursive ...
Continue reading
This book constitutes the refereed proceedings of the 14th International Conference on Principles and Practice of Constraint ...
Continue reading
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue reading
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThe aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...
Continue reading
While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Continue reading
Features state-of-the-art studies on the responsible innovation management. It illustrates the innovative methods from socio-economic ...
Continue reading
Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
Continue reading
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue reading
" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue reading
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue reading
This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Continue reading
These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue reading
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue reading