This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Lire la suiteThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Lire la suiteThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Lire la suiteThe series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
Lire la suiteCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
Lire la suiteCoverage includes query language and query optimization, data mining and knowledge discovery, P2P and grid-based data management, ...
Lire la suiteDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
Lire la suiteDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteThis book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
Lire la suiteThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
Lire la suiteThis volume contains the proceedings of the 3rd International Conference on AdvancesinInformationSystems (ADVIS)heldinIzmir,Turkey, ...
Lire la suiteThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Lire la suiteThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Lire la suitethis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Lire la suite