This book presents cutting-edge research results on the application of chaos theory, parametric and non-parametric statistics ...
Lire la suiteThe profession of pharmacist and pharmacology is a science that researches drugs, their properties, the composition of drugs ...
Lire la suiteThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lire la suiteThis volume offers a critical examination of the growing pressure to apply scientific principles as a means to improve education. ...
Lire la suiteThis book reveals the hidden power of the script we read in and how it shapes and drives our minds, ways of thinking, and ...
Lire la suiteThis volume represents the state of the art of research on scripting computer-supported collaborative learning and provides ...
Lire la suiteEducation is a universal priority. Currently, it is at a crossroad. In every society it is valued as a major road to produce ...
Lire la suiteAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suiteThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suiteThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
Lire la suiteSecure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...
Lire la suiteThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lire la suiteWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Lire la suiteTheme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...
Lire la suite" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Lire la suiteThis volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...
Lire la suiteThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Lire la suiteThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Lire la suiteYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Lire la suite