Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
اقرأ المزيدEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
اقرأ المزيدThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
اقرأ المزيدThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
اقرأ المزيدModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
اقرأ المزيدCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيدCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
اقرأ المزيدConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيدThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
اقرأ المزيدMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
اقرأ المزيدMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
اقرأ المزيدThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيدConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
اقرأ المزيدThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
اقرأ المزيدConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
اقرأ المزيد