This book presented numerous submissions for inclusion in the book. The papers are organized in topical sections on nonlinear ...
Lire la suiteThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Lire la suiteThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Lire la suiteThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Lire la suiteThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Lire la suiteThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Lire la suiteThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
Lire la suiteThis book including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, ...
Lire la suiteThis volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
Lire la suiteBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Lire la suiteIn this volume, the expression of specific adhesion molecules within human cancer tissues are highlighted. The expression ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...
Lire la suiteThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Lire la suiteThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Lire la suite