Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...
Continue reading
This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Continue reading
As information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Continue reading
As information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Continue reading
The aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
Continue reading
The aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
Continue reading
this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Continue reading
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue reading
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Continue reading
This book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), Based on rigorous ...
Continue reading
This book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in China, ...
Continue reading
This book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
Continue reading
The aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
Continue reading
The aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
Continue reading
The KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international ...
Continue reading
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Continue reading
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue reading
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue reading
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Continue reading
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
Continue reading