The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Lire la suiteA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Lire la suiteThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Lire la suiteModern macroeconomics suffers from an unclear link between short-term Keynesian analysis and long-term growth modelling. ...
Lire la suiteModern macroeconomics suffers from an unclear link between short-term Keynesian analysis and long-term growth modelling. ...
Lire la suiteThe motivation of this survey is to review companies’ internationalisation procedures from a logistics perspective. What ...
Lire la suiteThis volume creates an interdisciplinary forum for contemporary Turkey research in Germany. It presents research results ...
Lire la suiteThis methodological book summarises existing analysing techniques using data from PIAAC, a study initiated by the OECD that ...
Lire la suiteThe selection of good performance indicators is not an easy process. This monograph focuses on the designing of a Performance ...
Lire la suiteThis third and last volume in the series takes the perspective of non-EU countries on immigrant social protection. By focusing ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteHaving the high unemployment in Germany in mind, this book discusses how macroeconomic theory has evolved over the past forty ...
Lire la suiteMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Lire la suiteThe purpose of this volume is to present a comprehensive overview of recent advances in primate field research, ecology, ...
Lire la suiteThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lire la suiteSpecial functions and orthogonal polynomials in particular have been around for centuries. Can you imagine mathematics without ...
Lire la suiteSpecial functions and orthogonal polynomials in particular have been around for centuries. Can you imagine mathematics without ...
Lire la suite