Electronic Books

Total Books: 121 - 140 /162
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Weiterlesen
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

Weiterlesen
Public Key Cryptography - PKC 2005

Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...

Weiterlesen
Public Key Cryptography - PKC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...

Weiterlesen
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Weiterlesen
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Weiterlesen
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Weiterlesen
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

Weiterlesen
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

Weiterlesen
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Weiterlesen
Quantum Blockchain: An Emerging Cryptographic Paradigm / Rajesh Kumar Dhanaraj, Vani Rajasekar, SK Hafizul Islam, Balamurugan Balusamy, Ching-Hsien Hsu

While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...

Weiterlesen
Random Curves : Journeys of a Mathematician

These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital ...

Weiterlesen
Remote Sensing of Aquatic Coastal Ecosystem Processes

The aquatic coastal zone is one of the most challenging targets for environmental remote sensing. Properties such as bottom ...

Weiterlesen
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

Weiterlesen
SOFSEM 2006: Theory and Practice of Computer Science

This book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...

Weiterlesen
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

Weiterlesen
Security and Cryptography for Networks

This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...

Weiterlesen
Security and Cryptography for Networks

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...

Weiterlesen
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Weiterlesen
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Weiterlesen
Total Books: 121 - 140 /162