This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Weiterlesen
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Weiterlesen
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...
Weiterlesen
This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction ...
Weiterlesen
This text adopts the latter perspective by applying an arithmetic-algebraic viewpoint to the study of function fields as ...
Weiterlesen
This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Weiterlesen
This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Weiterlesen
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Weiterlesen
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Weiterlesen
The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Weiterlesen
The book offers a basic course in algebra for university students, structured according to the new regulations. Themes such ...
Weiterlesen
The book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Weiterlesen
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Weiterlesen
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Weiterlesen
This book is organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, ...
Weiterlesen