This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lee mas
The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lee mas
This book deals with the main control aspects in underwater manipulation tasks. The mathematical model with significant impact ...
Lee mas
The book includes a general introduction to the area, which also presents the vision of a grand challenge project: the "verifying ...
Lee mas
This book is organized in topical sessions on performance analysis of wireless systems, resource and QoS management, implementation ...
Lee mas