This book provides a forum for engineers and scientists in academia, industry, and governmentto address challenges and to ...
Lire la suiteThis book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...
Lire la suiteThis volume contains discuss and exchange state-of-the-art research results and experience, case studies and on-going research ...
Lire la suiteThis volume contains discuss and exchange state-of-the-art research results and experience, case studies and on-going research ...
Lire la suiteConstitutes the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference ...
Lire la suiteThomas Kyte has a simple philosophy: You can treat Oracle as a black box and shove data inside of it, or you can learn how ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
Lire la suiteFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lire la suiteThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lire la suiteThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Lire la suiteFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lire la suiteThe increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...
Lire la suiteThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Lire la suiteThis book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 5th International ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suite