Ability to use information and communication technologies (ICT) is an imperative for effective participation in today’s ...
Lire la suiteThis book summarizes the key findings from the second cycle of IEA’s International Computer and Information Literacy Study ...
Lire la suitePresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
Lire la suiteThis book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...
Lire la suiteThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Lire la suiteProcessor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because ...
Lire la suiteThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Lire la suiteConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Lire la suiteConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Lire la suiteThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suiteThis book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...
Lire la suiteTo discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Lire la suiteThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lire la suiteaddresses a wide variety of academic, administrative and leadership practices that are involved in quality work in higher ...
Lire la suite