Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
اقرأ المزيد
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
اقرأ المزيد
This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
اقرأ المزيد
This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
اقرأ المزيد
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
اقرأ المزيد
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيد
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيد
This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
اقرأ المزيد
Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيد
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
اقرأ المزيد
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
اقرأ المزيد
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
اقرأ المزيد
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيد
Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
اقرأ المزيد
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيد
The papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
اقرأ المزيد
Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
اقرأ المزيد