This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Lire la suiteThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Lire la suitePseudo-differential operators were initiated by Kohn, Nirenberg and Hörmander in the sixties of the last century. Beside ...
Lire la suiteThis book reports on recent advances on: (1) new methods and approaches for specific and sensitive detection and identification ...
Lire la suiteAlthough psychiatric disorders during pregnancy and the postpartum period are common, clinicians often feel apprehensive ...
Lire la suiteMental disorders are very common around us, the etiological factors and the secrets behind them have only begun to unwrap ...
Lire la suiteOn the one hand, the authors illuminate the neurological aspects of such psychiatric disorders as depression, anxiety disorders, ...
Lire la suitePsychoacoustics – Facts and Models offers a unique, comprehensive summary of information describing the processing of sound ...
Lire la suitea unique collaboration between experts in cognitive psychotherapy and political science, Psychological Processes in International ...
Lire la suiteThis volume offers insights from modelling measures of parental involvement and their relationship with student reading literacy ...
Lire la suitePsychoprosthetics is the study of the psychological aspects of prosthetic use and of rehabilitative processes in those conditions ...
Lire la suiteThis book fills a major gap in the practice literature for healthcare professionals engaged in providing psychosocial care ...
Lire la suiteinto account in particular respect of an intercultural and increasingly g- balized world. For what is experienced as painful, ...
Lire la suiteOf the current studies on extremophiles, approximately 30,000 articles by the year 2007, almost two-thirds have been performed ...
Lire la suiteThe collection is structured in four parts: I. Decentralized resource allocation processes for public and private goods II. ...
Lire la suiteThis book highlights the ethical issues and dilemmas that arise in the practice of public health. It is also a tool to support ...
Lire la suiteConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Lire la suite