Describes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Continue readingThe text illustrates the fundamental principles of the processing methods and deals with the various applications in detail. ...
Continue readingConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Continue readingThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Continue reading1. Provides a simple guide for geomatics engineering projects using recent and advanced technologies. 2. Includes new content ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Continue readingConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
Continue readingTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingPublic Relations, Branding and Authenticity: Brand Communications in the Digital Age explores the role of PR and branding ...
Continue readingPresents original articles introducing clinical and laboratory techniques for optimal esthetic results with newer dental ...
Continue readingKey management practices are considered and extended, including lean thinking, systems methodologies, business process reengineering, ...
Continue readingaddresses a wide variety of academic, administrative and leadership practices that are involved in quality work in higher ...
Continue readingWhile addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Continue readingQueuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...
Continue reading