The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Continue readingThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Continue readingThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
Continue readingThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Continue readingIt is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Continue readingThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Continue readingThis book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), ...
Continue readingIn the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...
Continue readingINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Symposium, Latin American Theoretical Informatics, ...
Continue readingCovers the multidimensional perspective of machine learning through the perspective of cloud computing and Internet of Things ...
Continue reading