This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Continue reading
This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Continue reading
The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue reading
The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue reading
The series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
Continue reading
Coverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
Continue reading
Coverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
Continue reading
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue reading
This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
Continue reading
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue reading
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue reading
This book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
Continue reading
This volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
Continue reading
This volume contains the proceedings of the 3rd International Conference on AdvancesinInformationSystems (ADVIS)heldinIzmir,Turkey, ...
Continue reading
The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue reading
The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue reading
this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Continue reading
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue reading