One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Lire la suiteThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suiteThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lire la suiteThis book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Lire la suiteThis book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Lire la suiteThe book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Lire la suiteThis book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...
Lire la suiteWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Lire la suiteThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Lire la suiteYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Lire la suiteNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lire la suiteThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...
Lire la suiteThe book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...
Lire la suiteThis book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...
Lire la suiteThis book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...
Lire la suiteThe reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...
Lire la suite