This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Lire la suiteThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Lire la suiteThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Lire la suiteThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Lire la suitePairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Lire la suite