In his last work, "Crisis of the European Sciences and Transcendental Phenomenology", Edmund Husserl formulated a radical ...
Lire la suiteThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Lire la suiteThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Lire la suiteThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
Lire la suiteReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
Lire la suitethis book explores the applications of Critical Pedagogy to actual classroom situations. Written in a straight-forward, concise, ...
Lire la suiteIn an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
Lire la suiteThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Lire la suiteBorder regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
Lire la suiteInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Lire la suiteRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lire la suiteThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Lire la suiteThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lire la suiteThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lire la suiteThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
Lire la suiteThis book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
Lire la suite