for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This two-volume set of LNCS 13017 and 13018 constitutes the refereed proceedings of the 16th International Symposium on Visual Computing, ISVC 2021, which was held in October 2021.
Bemærk: Kan ikke leveres før jul.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the Third International Symposium on Mathematical and Computational Oncology, ISMCO 2021, held in October 2021. The papers are organized in topical sections named: statistical and machine learning methods for cancer research;
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 24rd International Conference on Information... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions.
Bemærk: Kan ikke leveres før jul.
It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants.