Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007

Buy
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

(HTML tags aren't allowed.)

Cascade Separation of Powders
Cascade Separation of Powders
Industry imposes stringent requirements on the quality of powder materials used in many areas of technology. To satisfy these requirements, it is necessary to overcome technical problems and find solutions of the problems, in most cases by the application of highly efficient separation processes.

The authors describe the...

Jump Start Rails
Jump Start Rails

Jump Start Rails provides you with a fun and yet practical introduction to Rails, an incredibly popular framework that makes it possible to quickly develop incredibly powerful web applications with Ruby. This short book covers Rails 4, the latest version of the framework, and while it's not intended to be a completely comprehensive Rails...

Geometry: The Third Book of Foundations (The Foundations Trilogy)
Geometry: The Third Book of Foundations (The Foundations Trilogy)

In this third installment of his classic 'Foundations' trilogy, Michel Serres takes on the history of geometry and mathematics. Even more broadly, Geometry is the beginnings of things and also how these beginnings have shaped how we continue to think philosophically and critically. Serres rejects a traditional history of mathematics...


Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)
Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)

Through the rapid development of proteomics methods and technologies, an enormous amount of data was created, leading to a wide-spread rethinking of strategy design and data interpretation. In Data Mining in Proteomics: From Standards to Applications, experts in the field present these new insights within the proteomics community, taking the...

Game Character Design Complete: Using 3ds Max 8 and Adobe Photoshop CS2
Game Character Design Complete: Using 3ds Max 8 and Adobe Photoshop CS2

A game is only as intriguing as the characters that inhabit its world. Game Character Design Complete demonstrates each step of modeling, texturing, animating, and exporting compelling characters for your games. You’ll learn how to model in 3ds Max from sketch references, texture in Adobe Photoshop, rig bones, and animate a character back...

Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)

The sheer computing power of modern information technology is changing the face of research not just in science, technology and mathematics, but in humanities and cultural studies too. Recent decades have seen a major shift both in attitudes and deployment of computers, which are now vital and highly effective tools in disciplines where they...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy