This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue reading
The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue reading
This book deals with the main control aspects in underwater manipulation tasks. The mathematical model with significant impact ...
Continue reading
The book includes a general introduction to the area, which also presents the vision of a grand challenge project: the "verifying ...
Continue reading
This book is organized in topical sessions on performance analysis of wireless systems, resource and QoS management, implementation ...
Continue reading