One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...
Continue reading
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue reading
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue reading
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue reading
This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue reading
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue reading
This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Continue reading
This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Continue reading
The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Continue reading
This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...
Continue reading
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue reading
This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Continue reading
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Continue reading
Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue reading
These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue reading
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...
Continue reading
The book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...
Continue reading
This book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...
Continue readingThis book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...
Continue reading
The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...
Continue reading