Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...
Continue readingThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Continue readingThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue readingSecurity in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
Continue readingThis volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...
Continue readingThis book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed ...
Continue readingThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Continue readingNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue readingIn the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
Continue readingcombines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
Continue readingThis book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous ...
Continue readingThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
Continue readingTraditional approaches to the "intensification question" emphasize population pressure, climate change, bureaucratic management, ...
Continue reading1. Human Organism2. Chemical Basis of Life3. Cell Structures and Their Functions4. Tissues5. Integumentary System6. Skeletal ...
Continue readingSeismic Retrofit of Existing Reinforced Concrete Buildings readers will also find: Detailed treatment of each available strengthening ...
Continue readingEpileptic events are now known to occur more frequently in the intensive care unit (ICU) than previously thought, a situation ...
Continue readingThis volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Continue readingFinancial researchers extensively discuss the efficiency of capital markets and the existence of possible misreactions in ...
Continue readingOver the past several decades, the territory of preserver problems has been continuously enlarging within the frame of linear ...
Continue readingA major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...
Continue reading