Electronic Books

Total Books: 121 - 140 /162
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Lire la suite
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

Lire la suite
Public Key Cryptography - PKC 2005

Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...

Lire la suite
Public Key Cryptography - PKC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...

Lire la suite
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lire la suite
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lire la suite
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Lire la suite
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

Lire la suite
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

Lire la suite
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Lire la suite
Quantum Blockchain: An Emerging Cryptographic Paradigm / Rajesh Kumar Dhanaraj, Vani Rajasekar, SK Hafizul Islam, Balamurugan Balusamy, Ching-Hsien Hsu

While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...

Lire la suite
Random Curves : Journeys of a Mathematician

These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital ...

Lire la suite
Remote Sensing of Aquatic Coastal Ecosystem Processes

The aquatic coastal zone is one of the most challenging targets for environmental remote sensing. Properties such as bottom ...

Lire la suite
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

Lire la suite
SOFSEM 2006: Theory and Practice of Computer Science

This book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...

Lire la suite
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

Lire la suite
Security and Cryptography for Networks

This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...

Lire la suite
Security and Cryptography for Networks

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...

Lire la suite
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lire la suite
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lire la suite
Total Books: 121 - 140 /162