The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue readingThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue readingModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue readingThis book teaches data-parallel programming using C++ and the SYCL standard from the Khronos Group and walks through everything ...
Continue readingThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue readingThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue readingThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Continue readingThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Continue readingThis volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
Continue readingThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Continue readingThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, ...
Continue readingDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Continue readingIt is always a special honor to chair the European Dependable Computing C- ference (EDCC). EDCC has become one of the well-established ...
Continue readingDesign of Systems on a Chip: Design&Test is the second of two volumes addressing the design challenges associated with new ...
Continue readingThe Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. This provides an excellent ...
Continue readingDesigning Embedded Processors examines the many ways in which processor based systems are designed to allow low power devices. ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue reading