Electronic Books

Total Books: 141 - 160 /218
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lee mas
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS

Constitutes the proceedings of the 5 confederated international conferences on Cooperative Information Systems, Distributed ...

Lee mas
On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...

Lee mas
On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...

Lee mas
Online Communities and Social Computing

The 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. China, ...

Lee mas
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Lee mas
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lee mas
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Lee mas
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

Lee mas
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Lee mas
Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...

Lee mas
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

Lee mas
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lee mas
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Lee mas
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lee mas
Progress in Cryptology - VIETCRYPT 2006

The papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...

Lee mas
Progress in Cryptology – INDOCRYPT 2007

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...

Lee mas
Total Books: 141 - 160 /218