This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
اقرأ المزيدThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
اقرأ المزيدThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
اقرأ المزيدThe series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
اقرأ المزيدCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
اقرأ المزيدCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
اقرأ المزيدDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيدThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
اقرأ المزيدDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيدDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيدThis book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
اقرأ المزيدThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
اقرأ المزيدThis volume contains the proceedings of the 3rd International Conference on AdvancesinInformationSystems (ADVIS)heldinIzmir,Turkey, ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
اقرأ المزيد