for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 7th International Conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017. This year’s conference drew special attention to the ever-increasing role of the Internet of Things (IoT);
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017.
Bemærk: Kan ikke leveres før jul.
This volume collects contributions written bydifferent experts in honor of Prof. It covers awide variety of research topics, from differential geometry to algebra, butparticularly focuses on the geometric formulation of variational calculus;
Bemærk: Kan ikke leveres før jul.
This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of... Læs mere
Bemærk: Kan ikke leveres før jul.
Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of... Læs mere
Bemærk: Kan ikke leveres før jul.
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems.
Bemærk: Kan ikke leveres før jul.
Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of... Læs mere
Bemærk: Kan ikke leveres før jul.
Das Buch fasst alle Sachverhalte zum Risikomanagement zusammen, verbindet sie mit anderen Informationsquellen und umrahmt sie mit vielen Praxistipps, 38 Abbildungen und Tabellen und 14 Fallbeispielen.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014.
Bemærk: Kan ikke leveres før jul.
In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Bemærk: Kan ikke leveres før jul.
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties.