th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
Continue readingConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Continue readingThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Continue readingThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Continue readingA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Continue readingConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThe physical world is studied by means of mathematical models, which consist of differential, integral, and integro-differential ...
Continue readingCurrently the necessary information exists in a multitude of forms and formats geographically and physically scattered over ...
Continue readingIn Laboratory Control System Operations in a GMP Environment, readers are given the guidance they need to implement a CGMP ...
Continue readingOver the past decade there has been a gradual shift away from simply relying on engineering solutions to individual landslide ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 18th International Workshop on Languages and Compilers ...
Continue readingOptical Resonators provides a detailed discussion of the properties of optical resonators for lasers from basic theory to ...
Continue readingIn this book control algorithms are represented by the linear graph-schemes of algorithms (GSA), where the number of operator ...
Continue readingMATLAB® is used in a wide range of applications in geosciences, such as image processing in remote sensing, generation and ...
Continue readingIntroduces and explores a variety of schemes designed to empower, enhance, and represent multi-institutional and multi-disciplinary ...
Continue readingGranular matter displays a variety of peculiarities that distinguish it from other appearances studied in condensed matter ...
Continue readingThis book presents rigorous treatments of issues related to congestion pricing. The chapters describe recent advances in ...
Continue readingThis book presents rigorous treatments of issues related to congestion pricing. The chapters describe recent advances in ...
Continue reading