This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
WeiterlesenThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
WeiterlesenThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
WeiterlesenThe series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
WeiterlesenCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
WeiterlesenCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
WeiterlesenDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
WeiterlesenThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
WeiterlesenDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
WeiterlesenDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
WeiterlesenThis book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
WeiterlesenThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
WeiterlesenThis volume contains the proceedings of the 3rd International Conference on AdvancesinInformationSystems (ADVIS)heldinIzmir,Turkey, ...
WeiterlesenThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
WeiterlesenThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Weiterlesenthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Weiterlesen