The book is aimed at researchers and government policy makers who wish to keep abreast of the most recent developments in ...
Lire la suiteThis book is the result of the Proceedings of the NATO Advanced Research Workshop on Air, Water and Soil Quality Modelling ...
Lire la suiteThis volume contains the lectures and seminars given at the NATO Advanced Study Institute on “Sensor Systems for Biological ...
Lire la suiteThe Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology ...
Lire la suiteThis book presented sections on mobility and sensing, applications of AmI, activity and location sensing, AmI and artificial ...
Lire la suiteThis book presented sections on mobility and sensing, applications of AmI, activity and location sensing, AmI and artificial ...
Lire la suiteThis volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe16thIFIP/IEEEInternationalWorkshop ...
Lire la suiteproposes a framework for assessing countries’ levels of compliance with international space law and norms. It begins by ...
Lire la suiteThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Lire la suiteDiscusses existing conventional radio frequency (RF)-based wireless access technology and presents the challenges that can ...
Lire la suiteThe goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
Lire la suiteThe goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Lire la suiteMS is continuously developing as one of the most re- able analytical method for elucidating the structure of molecules originating ...
Lire la suiteThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lire la suite