This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lire la suite
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suite
A recent trend in the field of Galois theory is to tie the previous theory of curve coverings (mostly of the Riemann sphere) ...
Lire la suite
Most of the papers included here address methodology and feature practical case studies, so that the book likely has broad ...
Lire la suite
It focused on Aerospace, Electronic Industry, Chemical Technology, Life Sciences, Materials, Geophysics, Financial Mathematics ...
Lire la suite
It focused on Aerospace, Electronic Industry, Chemical Technology, Life Sciences, Materials, Geophysics, Financial Mathematics ...
Lire la suite
ECMI is synonymous with European Mathematics for Industry and organizes successful biannual conferences. The 14th European ...
Lire la suite
Projective duality is a very classical notion naturally arising in various areas of mathematics, such as algebraic and differential ...
Lire la suite
Projective geometry, and the Cayley-Klein geometries is one of the foundations of algebraic geometry and has many applications ...
Lire la suite
Projective geometry, and the Cayley-Klein geometries is one of the foundations of algebraic geometry and has many applications ...
Lire la suite
Proofs from THE BOOK è un'opera straordinaria che ha saputo calamitare l'interesse di numerosissimi lettori, matematici ...
Lire la suite
Proofs from THE BOOK è un'opera straordinaria che ha saputo calamitare l'interesse di numerosissimi lettori, matematici ...
Lire la suite
The place in survival analysis now occupied by proportional hazards models and their generalizations is so large that it ...
Lire la suite
The topics in the book include: - the representation of mathematical statements by formulas in a formal language. - the interpretation ...
Lire la suite
This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Lire la suite
Pseudo-differential operators were initiated by Kohn, Nirenberg and Hörmander in the sixties of the last century. Beside ...
Lire la suite
The objective is to look at pseudo-differential operators and related topics and to report recent advances in a broad spectrum ...
Lire la suite
The objective is to look at pseudo-differential operators and related topics and to report recent advances in a broad spectrum ...
Lire la suite
This book presents the author’s new method of two-stage maximization of likelihood function, which helps to solve a series ...
Lire la suite
This book deals with the effect of public and semi-public companies on economy. In traditional economic models, several private ...
Lire la suite