In his last work, "Crisis of the European Sciences and Transcendental Phenomenology", Edmund Husserl formulated a radical ...
Lee masThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Lee masThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Lee masThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
Lee masReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
Lee masthis book explores the applications of Critical Pedagogy to actual classroom situations. Written in a straight-forward, concise, ...
Lee masIn an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
Lee masThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Lee masBorder regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
Lee masInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Lee masRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lee masThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Lee masThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Lee masThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lee masThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lee masThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lee masThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Lee masThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Lee masConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
Lee masThis book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
Lee mas