This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Lire la suiteSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suiteDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
Lire la suiteContributors to this new book are leaders in the field of diapause studies, and many authors were participants at a recent ...
Lire la suiteWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Lire la suiteIWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
Lire la suiteAdvice about how to achieve a PhD usually falls short of relevance because the ways of creating and reporting knowledge differ ...
Lire la suiteThe aim of this book is to describe an efficient procedure to model dynamical contact problems with friction. This procedure ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
Lire la suiteThis book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
Lire la suiteConstitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
Lire la suiteThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
Lire la suiteThis volume presents a collection of papers on the enticing and complex theme of Ergativity. The papers exemplify theoretical ...
Lire la suite