This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suite
The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lire la suite
This book deals with the main control aspects in underwater manipulation tasks. The mathematical model with significant impact ...
Lire la suite
The book includes a general introduction to the area, which also presents the vision of a grand challenge project: the "verifying ...
Lire la suite
This book is organized in topical sessions on performance analysis of wireless systems, resource and QoS management, implementation ...
Lire la suite