 
                One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...
Weiterlesen 
                The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Weiterlesen 
                This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Weiterlesen 
                This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Weiterlesen 
                This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Weiterlesen 
                This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Weiterlesen 
                This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Weiterlesen 
                The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...
Weiterlesen 
                Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Weiterlesen 
                This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Weiterlesen 
                You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Weiterlesen 
                Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Weiterlesen 
                These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...
Weiterlesen 
                The book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...
Weiterlesen 
                This book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...
WeiterlesenThis book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...
Weiterlesen 
                The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...
Weiterlesen