This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Continue readingPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Continue readingWithin just a few years, the huge popularity of peer-to-peer systems and the explosion of peer-to-peer research have created ...
Continue readingtoday it’s well within your grasp, thanks to Podcasting using only some simple recording equipment, a computer, and the ...
Continue readingThe 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
Continue readingRemarkable features of revenue management (RM) problems in the cargo, manufacturing and broadcasting industries are so-called ...
Continue readingThe 17 revised full papers and five revised short papers presented together with two invited talks were carefully selected ...
Continue readingThis book constitutes the refereed proceedings of the 13th International Colloquium on Structural Information and Communication ...
Continue readingThis book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...
Continue readingThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue reading