The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Continue readingThe 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th ...
Continue readingEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Continue readingThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue readingThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue readingDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue readingThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
Continue readingDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue readingDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue readingAdvances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
Continue readingTerrain analysis has been an active study field for years and attracted research studies from geographers, surveyors, engineers ...
Continue readingThis book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Continue readingThis book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Continue readingThis volume features a collection of papers on emerging concepts, significant insights, novel approaches and ideas in information ...
Continue readingThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue readingThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue readingThe volume 3767 constitutes the refereed proceedings of the 6th Pacific Rim Conference on Multimedia, PCM 2005, The accepted ...
Continue readingThe volume 3768 constitutes the refereed proceedings of the 6th Pacific Rim Conference on Multimedia, PCM 2005, The accepted ...
Continue readingThis book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading