The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suiteThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Lire la suiteThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lire la suiteThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
Lire la suiteThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Lire la suiteThis book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...
Lire la suiteThis book constitutes the refereed proceedings of the 21st International Conference on Architecture of Computing Systems, ...
Lire la suiteThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Lire la suiteThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI ...
Lire la suiteThe basic techniques of algebra and number theory useful in recent applications to cryptography and codes are developed, ...
Lire la suiteThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lire la suiteThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lire la suiteThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lire la suiteThe two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, ...
Lire la suiteThis book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
Lire la suite