Brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence ...
Lire la suiteshows readers a path to improve their project delivery via the application of lean concepts and process management. Authors ...
Lire la suiteThe three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
Lire la suiteThis book addresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems ...
Lire la suiteAdresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they ...
Lire la suiteFocuses on the relevance of non-fungible token-based products in the current hyper-digitalized and hyper-connected world. ...
Lire la suiteThis monograph proposes how to manage complexity by organizing the system as a State Tree Structure (STS). an efficient recursive ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Conference on Principles and Practice of Constraint ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteThe aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...
Lire la suiteWhile addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Lire la suiteFeatures state-of-the-art studies on the responsible innovation management. It illustrates the innovative methods from socio-economic ...
Lire la suiteUp to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
Lire la suiteWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Lire la suite" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Lire la suiteThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Lire la suiteThis volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Lire la suiteThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Lire la suiteSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Lire la suite