Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...
Lee masThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Lee masAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Lee masAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Lee masThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
Lee masThe aim of the symposium was to promote and disseminate ongoing research on multi- dia hardware and image sensor technologies, ...
Lee masthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Lee masThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Lee masThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Lee masThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), Based on rigorous ...
Lee masThis book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in China, ...
Lee masThis book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
Lee masThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
Lee masThe aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
Lee masThe KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international ...
Lee masThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Lee masThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lee masThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lee masThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lee masThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
Lee mas