Зарегистрироваться
Восстановить пароль
FAQ по входу

Материалы конференций

Доверенные пользователи и модераторы раздела

  • Без фильтрации типов файлов
A
Springer-Verlag Berlin Heidelberg, 2010. — 333 p. — ISBN: 978-3-642-14711-1, 978-3-642-14712-8. This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and...
  • №1
  • 5,82 МБ
  • добавлен
  • описание отредактировано
Springer International Publishing, 2014. — 389 p. — ISBN: 978-3-319-16294-2, 978-3-319-16295-9. This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and...
  • №2
  • 19,43 МБ
  • добавлен
  • описание отредактировано
B
Springer, 2017. — 150 p. — (Lecture Notes in Electrical Engineering). — ISBN10: 3319592645, ISBN13: 978-3319592640. This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and...
  • №3
  • 3,19 МБ
  • добавлен
  • описание отредактировано
Springer, 2012. — 592 p. — ISBN: 3642312837, 9783642312830, 9783642312847, 3642312845. This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are...
  • №4
  • 8,48 МБ
  • добавлен
  • описание отредактировано
Springer, 2017. — 155 p. — (Lecture Notes in Computer Science). — ISBN10: 3319557130. — ISBN13: 978-3319557137. This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016. The 9 full papers presented were carefully reviewed and...
  • №5
  • 5,46 МБ
  • добавлен
  • описание отредактировано
New York: Springer-Verlag, 2002. — 624 p. — ISBN: 3-540-00409-2. This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002. The 41 revised full papers presented together with two invited contributions were carefully selected...
  • №6
  • 15,96 МБ
  • добавлен
  • описание отредактировано
C
Springer Nature Switzerland AG, 2018. — XVII+548 p. — (Lecture Notes in Computer Science, 11261). — ISBN: 978-3-030-02641-7. This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short...
  • №7
  • 7,60 МБ
  • добавлен
  • описание отредактировано
Springer Nature Switzerland AG, 2018. — xxx+219 p. — (Lecture Notes in Computer Science, 11348). — ISBN: 978-3-030-05072-6. This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented together with 5 short paper,...
  • №8
  • 2,27 МБ
  • добавлен
  • описание отредактировано
Proceedings of the NATO Advanced Study Institute on Information Security and Related Combinatories Opatija, Croatia 31 May - 11 June 2010. — IOS Press, 2011. — 460 p. — ISBN 978-1-60750-662-1. This book contains papers based on lectures presented at the NATO Advanced Study Institute "Information Security and Related Combinatorics", held in the beautiful town of Opatija at the...
  • №9
  • 6,78 МБ
  • добавлен
  • описание отредактировано
D
Springer, 2015. — 754 p. — ISBN: 3319182749, 9783319182742 Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of...
  • №10
  • 10,87 МБ
  • добавлен
  • описание отредактировано
New York: Springer, 2005. — 179 p. — ISBN13: 978-3-540-26557-3. Language: English. This book const?tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers...
  • №11
  • 2,12 МБ
  • добавлен
  • описание отредактировано
F
Springer, 2017. — 709 p. — (Lecture Notes in Computer Science). — ISBN10: 3319667866, 13 978-3319667867. This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130...
  • №12
  • 36,72 МБ
  • добавлен
  • описание отредактировано
G
New York: Springer, 2008. — 385 p. — ISBN13: 978-3-540-85503-3. Pairing-Based Cryptography Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science). This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London,...
  • №13
  • 4,42 МБ
  • добавлен
  • описание отредактировано
Springer, 2017. — 446 p. — (Lecture Notes in Computer Science). — ISBN10: 3319678159, 13 978-3319678153. This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on...
  • №14
  • 16,80 МБ
  • добавлен
  • описание отредактировано
H
Springer, 2017. — 395 p. — (Lecture Notes in Computer Science). — ISBN10: 331955588X. — ISBN13: 978-3319555881. This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and...
  • №15
  • 16,56 МБ
  • добавлен
  • описание отредактировано
Springer-Verlag Berlin Heidelberg, 2012. — 332 p. — ISBN: 9783642334818, 3642334814. This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were...
  • №16
  • 4,15 МБ
  • добавлен
  • описание отредактировано
Springer Science & Business Media, 2008. — 945 p. This volume contains the proceedings of the 19th International Symposium on Algorithms and Computation (ISAAC 2008), held on the Gold Coast, Australia, December 15–17, 2008. In the past, it was held in Tokyo (1990), Taipei (1991), Nagoya (1992), Hong Kong (1993), Beijing (1994), Cairns (1995), Osaka (1996), Singapore (1997),...
  • №17
  • 10,68 МБ
  • добавлен
  • описание отредактировано
J
Springer, 2013. — 584 p. — ISBN: 978-3-642-38979-5, 978-3-642-38980-1. This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in...
  • №18
  • 10,00 МБ
  • добавлен
  • описание отредактировано
New York: Springer, 2010. — 482 p. — ISBN13: 978-3-642-17454-4. 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings. The 4th International Conference on Pairing-Based Cryptography (Pairing 2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial...
  • №19
  • 4,56 МБ
  • добавлен
  • описание отредактировано
Springer, 2005. — 471 p. — ISBN: 3-540-22666-4. 6th International Workshop Cambridge, MA, USA, August 11-13, 2004 Proceedings This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004. The 32 revised full papers presented were carefully reviewed and...
  • №20
  • 18,39 МБ
  • добавлен
  • описание отредактировано
L
Springer International Publishing, 2015. — XII, 385 p. — ISBN: 978-3-319-22173-1; 978-3-319-22174-8. This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They...
  • №21
  • 8,45 МБ
  • добавлен
  • описание отредактировано
Proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007. — World Scientific Publishing, 2008. — 288 p. — ISBN13: 978-981-283-223-8. The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological...
  • №22
  • 2,06 МБ
  • добавлен
  • описание отредактировано
M
Proceedings of BFCA’05 conference (Булевы функции в криптографии и приложениях) Universites de Rouen et du Havre, 2005, - 219 pp. The Boolean Functions: Cryptography and Applications international meeting took place on March 7-8th, 2005, in Rouen, France. It was the first of an expected series in the field of Boolean functions. BFCA’05 was organized by the LIFAR, University of...
  • №23
  • 5,60 МБ
  • добавлен
  • описание отредактировано
P
New York: Springer, 2011. — 479 p. — ISBN13: 978-3-642-22496-6. 16th Australasian Conference, ACISP 2011 Melbourne, Australia, July 11-13, 2011 Proceedings. This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together...
  • №24
  • 6,49 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 722 p. — ISBN: 3030643808 This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst...
  • №25
  • 13,72 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 726 p. — ISBN 3030643778. This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst...
  • №26
  • 29,19 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 685 p. — ISBN: 3030643808 This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst...
  • №27
  • 13,89 МБ
  • добавлен
  • описание отредактировано
R
New York: Springer-Verlag, 2005. — 468 p. — ISBN13: 978-3-540-28474-1. This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002. The 41 revised full papers presented together with two invited contributions were carefully...
  • №28
  • 16,92 МБ
  • добавлен
  • описание отредактировано
Springer, 2016. — 551 p. — (Lecture Notes in Computer Science 9100). — ISBN: 978-3-662-49301-4. This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David...
  • №29
  • 8,83 МБ
  • добавлен
  • описание отредактировано
Springer, 2016. — 549 p. — (Lecture Notes in Computer Science 9100). — ISBN 978-3-662-49300-7. This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David...
  • №30
  • 27,51 МБ
  • добавлен
  • описание отредактировано
S
Springer, 2021. — 487 p. — ISBN 978-3-030-78371-6. The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions....
  • №31
  • 18,91 МБ
  • добавлен
  • описание отредактировано
Springer, 2021. — 487 p. — ISBN 978-3-030-78371-6. The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions....
  • №32
  • 41,57 МБ
  • добавлен
  • описание отредактировано
World Scientific Publishing Company, 2009. — 198 p. — (Series on Coding Theory and Cryptology). — ISBN13: 978-981-283-768-4. This is the proceedings volume of the International Centre for Pure and Applied Mathematics Summer School course held in Ankara, Turkey, in August 2008. Contributors include Greferath, Honold, Landgev, Ling, Lopez, Nebe, Nechaev, A-zbudak, Sole, Wolfmann...
  • №33
  • 8,75 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 427 p. — ISBN: 3030629732. This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information...
  • №34
  • 23,48 МБ
  • добавлен
  • описание отредактировано
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 370 pages This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2...
  • №35
  • 3,78 МБ
  • дата добавления неизвестна
  • описание отредактировано
V
Springer, 2011. — 196 p. — (Lecture Notes in Computer Science, 6519). — ISBN: 3-642-18072-8, 978-3-642-18072-9. This book constitutes the thoroughly refereed post-conference proceedings of the 5th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2010, held in Leeds, UK, in April 2010. The 15 revised papers presented were carefully selected...
  • №36
  • 1,99 МБ
  • добавлен
  • описание отредактировано
W
New York: Springer-Verlag, 2003. — 456 p. — ISBN13: 978-3-540-40833-9. These are the proceedings of CHES 2003, the fifth workshop on Cryptographic Hardware and Embedded Systems, held in Cologne on September 8–10, 2003. As with every previous workshop, there was a record number of submissions despite the much earlier deadline in this year’s call for papers. This is a clear...
  • №37
  • 6,84 МБ
  • добавлен
  • описание отредактировано
Y
Proceedings of 22nd International Conference, CANS 2019: Fuzhou, China, October 25 – 27, 2019. Springer, 2019. — xiv, 540 p. — (Lecture Notes in Computer Science, 11829). — ISBN: 978-3-030-31577-1, 978-3-030-31578-8. True PDF This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China,...
  • №38
  • 9,82 МБ
  • добавлен
  • описание отредактировано
Springer-Verlag, 2011. — XII, 630 p. — (Lecture Notes in Computer Science, 6597). — ISBN: 978-3-642-19570-9, 978-3-642-19571-6. This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were...
  • №39
  • 5,31 МБ
  • добавлен
  • описание отредактировано
Z
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, hunhua Su. - Springer, 2021. — 515 p. — ISBN 978-3-030-81644-5. This book constitutes the proceedings of the satellite workshops...
  • №40
  • 55,47 МБ
  • добавлен
  • описание отредактировано
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, hunhua Su. - Springer, 2021. — 515 p. — ISBN 978-3-030-81644-5. This book constitutes the proceedings of the satellite workshops...
  • №41
  • 65,69 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.