Home | Amazing | Today | Tags | Publishers | Years | Search 
Public Key Cryptography  PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.

It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the
...
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
From the reviews:

"This book presents a large number of probabilistic aspects of cryptographic systems . All the classical statistical tests on random sequences are motivated and precisely detailed here. This book is surely a valuable companion to the NIST standard reference ." (Jérémie Bourdon, Mathematical...

Computational Intelligence in Economics and Finance: Volume II
Computational Intelligence in Economics and Finance: Volume II
Computational intelligence (CI), as an alternative to statistical and econometric approaches, has been applied to a wide range of economics and finance problems in recent years, for example to price forecasting and market efficiency.

This book contains research ranging from applications in financial markets and business administration to...

Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)
Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)
The purpose of this reviewarticle is to serve as an introduction and at the same time, as an invitation to the theory of towers of function fields over finite fields. More specifically, we treat here the case of explicit towers; i.e., towers where the function fields are given by explicit equations. The asymptotic behaviour of the genus and of the...
Worldwide Wi-Fi: Technological Trends and Business Strategies
Worldwide Wi-Fi: Technological Trends and Business Strategies

Your success guide to the next wireless revolution

The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).

Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by...

Performance Evaluation and Benchmarking
Performance Evaluation and Benchmarking
It is a real pleasure and honor for us to present you this book titled
Performance Evaluation and Benchmarking. Performance evaluation and benchmarking
is at the heart of computer architecture research and development. Without
a deep understanding of benchmarks’ behavior on a microprocessor and
without efficient and
...
Social Solidarity and the Gift
Social Solidarity and the Gift
This book is the result of more than ten years of research and teaching about the themes of the gift and solidarity. It all started in 1992 when, in conversations with anthropologist Willy Jansen, I was put on the track of the gift literature. This was followed by an invitation from the Dutch newspaper Trouw on the occasion of its fiftieth...
Computer Systems: Theory, Technology and Applications
Computer Systems: Theory, Technology and Applications

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.

From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are...

Character Development and Storytelling for Games (Game Development Series)
Character Development and Storytelling for Games (Game Development Series)
This is a book of ideas and of choices. Knowing which choices to make is not teachable. It's part of that creative instinct we call talent whose secret voice guides us every time we sit down at the keyboard. All stories are not identical. They are shaped by all those unique facets of the human beings who write them. All any writer can do when he...
Encyclopedia of Genocide (2 Volumes)
Encyclopedia of Genocide (2 Volumes)

The Encyclopedia is designed in an innovative structure that combines four types of entries:

  • Traditional Entries, or basic encyclopedic summaries of the knowledge in a typical area or field of study;
  • Feature Entries, which include...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy