The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Continue readingThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Continue readingThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis book first establishes a background about concrete structures and porosity linked with concrete hydration, then goes ...
Continue readingThis book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...
Continue readingWith blockchain being invented in 2008, cryptocurrencies have grown steadily through the years. Cryptocurrencies continue ...
Continue readingExplores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Continue readingPresents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, ...
Continue readingDeepen your understanding of blockchain technology and develop your own blockchain applications. This book provides a thorough ...
Continue readingIncludes numerous exercises and test questions to help you solidify what you have learned as you progress through the book, ...
Continue readingBrings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence ...
Continue readingPacked with useful information and is a must-have for any Java programmer. You will: Run a Java file with a single command Learn ...
Continue readingThis is the first book dealing with the intricate epigenetic mechanisms (DNA methylation, histone modification, alteration ...
Continue readingshows readers a path to improve their project delivery via the application of lean concepts and process management. Authors ...
Continue readingThe three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
Continue reading