Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...
اقرأ المزيدThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
اقرأ المزيدAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
اقرأ المزيدAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
اقرأ المزيدThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
اقرأ المزيدThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
اقرأ المزيدthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
اقرأ المزيدThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), Based on rigorous ...
اقرأ المزيدThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in China, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
اقرأ المزيدThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
اقرأ المزيدThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
اقرأ المزيدThe KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيدThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
اقرأ المزيدThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
اقرأ المزيد