Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...
WeiterlesenThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
WeiterlesenAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
WeiterlesenAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
WeiterlesenThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
WeiterlesenThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
Weiterlesenthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
WeiterlesenThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), Based on rigorous ...
WeiterlesenThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in China, ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
WeiterlesenThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
WeiterlesenThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
WeiterlesenThe KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
WeiterlesenThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
Weiterlesen