This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Continue readingSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Continue readingDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
Continue readingContributors to this new book are leaders in the field of diapause studies, and many authors were participants at a recent ...
Continue readingWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Continue readingIWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
Continue readingAdvice about how to achieve a PhD usually falls short of relevance because the ways of creating and reporting knowledge differ ...
Continue readingThe aim of this book is to describe an efficient procedure to model dynamical contact problems with friction. This procedure ...
Continue readingVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Continue readingVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Continue readingLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
Continue readingThis book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
Continue readingConstitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
Continue readingThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
Continue readingThis volume presents a collection of papers on the enticing and complex theme of Ergativity. The papers exemplify theoretical ...
Continue reading