This volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Continue readingThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Continue readingConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingMycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...
Continue readingThis book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Continue readingThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Continue readingThis book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...
Continue readingThis book presents a topical, comprehensive and differentiated analysis of Germany’s public administration and reforms. ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue readingDelivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...
Continue readingInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Continue readingThis book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...
Continue readingAlthough the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...
Continue readingThis bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...
Continue readingThe book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
Continue readingThis book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...
Continue reading