One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingThis book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Continue readingThis book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Continue readingThe book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Continue readingThis book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...
Continue readingWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue readingThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Continue readingYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Continue readingNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue readingThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...
Continue readingThe book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...
Continue readingThis book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...
Continue readingThis book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...
Continue readingThe reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...
Continue reading