Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
WeiterlesenEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
WeiterlesenThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
WeiterlesenThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
WeiterlesenModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
WeiterlesenConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
WeiterlesenThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
WeiterlesenThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
WeiterlesenMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
WeiterlesenMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
WeiterlesenThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
WeiterlesenConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
WeiterlesenThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
WeiterlesenThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
WeiterlesenThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
WeiterlesenConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Weiterlesen