You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
« Pouvoir d'achat », « coût du travail », « inégalités ». Comme l'exprime le champ lexical de la rémunération, celle-ci est au coeur des relations de travail. Mais comment les juges raisonnent-ils lorsque les parties entrent en conflit ? Confrontés aux enjeux sociaux et économiques de la rémunération du travail, comment tranchent-ils les questions juridiques qui leur sont soumises ? Leurs analyses sont-elles le fruit de leur culture juridique, ou puisent-elles leurs origines dans les particularités sociales, économiques ou managériales de leur pays ? Ces questions ont été au centre d'un travail de recherche mené pendant deux ans par le GEFACT (Groupe d'Etude Franco- Allemand sur le Contentieux du Travail), lequel regroupe des universitaires et étudiants français et allemands, mais aussi des magistrats rattachés à différents degrés de juridictions ainsi que des avocats.
This book constitutes the refereed proceedings of the Third International Conference on New Trends in Information and Communications Technology Applications, NTICT 2018, held in Baghdad, Iraq, in October 2018. The 18 papers presented were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections, namely: Computer networks; system and network security; machine learning; intelligent control system; communication applications; computer vision; and e-learning.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
This book constitutes the refereed proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science, STACS 2005, held in Stuttgart, Germany in February 2005. The 54 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 217 submissions. A broad variety of topics from theoretical computer science are addressed, in particular complexity theory, algorithmics, computational discrete mathematics, automata theory, combinatorial optimization and approximation, networking and graph theory, computational geometry, grammar systems and formal languages, etc.
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
description not available right now.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.