You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.
This is the proceedings volume of an international conference entitled Complex Analysis and Potential Theory, which was held to honor the important contributions of two influential analysts, Kohur N. GowriSankaran and Paul M. Gauthier, in June 2011 at the Centre de Recherches Mathematiques (CRM) in Montreal. More than fifty mathematicians from fifteen countries participated in the conference. The twenty-four surveys and research articles contained in this book are based on the lectures given by some of the most established specialists in the fields. They reflect the wide breadth of research interests of the two honorees: from potential theory on trees to approximation on Riemann surfaces, fr...
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018. The 35 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security.
None
The conference program consists of invited sessions on selected topics and contributed sessions The papers describe original work and lie in scope of one of the conference topics The purpose of ITC 2021 is the exchange of information on research, development, and applications of all topics related to Telecommunications (TC) including wireless communications, electronics, and radar systems
Fish accomplish most of their basic behaviors by swimming. Swimming is fundamental in a vast majority of fish species for avoiding predation, feeding, finding food, mating, migrating and finding optimal physical environments. Fish exhibit a wide variety of swimming patterns and behaviors. This treatise looks at fish swimming from the behavioral and