This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...
Lire la suiteCompressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a ...
Lire la suitePresents a practical framework for strategically leveraging AI to boost sales, marketing and customer-centricity Showcases ...
Lire la suiteProvides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet ...
Lire la suiteThe sixth international conference on AD-HOC NetwOrks and Wireless was held in the city of Morelia, Michoacan State, Mexico. ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Ad-Hoc Networks and Wireless, ADHOiNOW ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Advanced Data Mining and Applications, ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference on Advanced Data Mining and Applications, ...
Lire la suiteThis book presents a comprehensive treatment of biometrics and offers coverage of the entire gamut of topics in the field, ...
Lire la suiteZero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
Lire la suiteThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Lire la suiteThis book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
Lire la suiteThis book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held ...
Lire la suiteThis book constitutes the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International ...
Lire la suiteThis book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Lire la suiteThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Lire la suiteThe series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
Lire la suiteDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteThese volume on Information Systems Development examine the exchange of ideas between academia and industry and aims to explore ...
Lire la suiteThese volume on Information Systems Development examine the exchange of ideas between academia and industry and aims to explore ...
Lire la suite