This book constitutes the refereed post-conference proceedings of the 7th International Conferenc...
This volume constitutes the proceedings of the 7th International Conference on Application Intell...
Unser bisheriger Preis:ORGPRICE: 74,50 €
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Associat...
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th Internati...
This book constitutes the post-conference proceedings of the 17th International Conference on Inf...
A rich stream of papers and many good books have been written on cryptography, security, and priv...
The 1st International Conference on 'Applied Cryptography and Network Se- rity' (ACNS 2003) was s...
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju ...
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was ...
This book constitutes the post-conference proceedings of the 16th International Conference on Inf...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th Internationa...
The 32nd International Colloquium on Automata, Languages and Programming (ICALP 2005) was held in...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
This book constitutes the refereed proceedings of the 5th International Conference on Science of ...
This book constitutes the refereed proceedings of the 18th International Conference on Informatio...
This book constitutes the refereed post-conference proceedings of the Second International Confer...
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cr...
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internat...
This book constitutes the refereed proceedings of the 12th International Conference on Informatio...
The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Ital...
This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (St...
This book constitutes the thoroughly refereed post-conference proceedings of the International Co...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th Internationa...
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internat...
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Secu...
This book constitutes the post-conference proceedings of the 15th International Conference on Inf...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Pr...
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology ...
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International...
This book constitutes the proceedings of the Second International Conference on Science of Cyber ...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
This book constitutes the thoroughly refereed post-conference proceedings of the 11th Internation...
This book constitutes the proceedings of the International Conference on Trusted Systems, held in...
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17 sup ...
This book constitutes the thoroughly refereedpost-conference proceedings of the 7th International...
The three-volume set constitutes revised selected papers of the 21st International Conference on ...
This book constitutes the proceedings of the Third International Conference on Science of Cyber S...
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was spo...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th Internation...
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on I...
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17 sup ...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Internation...
The First International Conference on Digital Rights Management: Technology, Issues, Challenges a...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busa...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Pr...
Normal0falsefalsefalseEN-USX-NONEX-NONE This book constitutes the thoroughly refereedpost-confere...
The three-volume set constitutes revised selected papers of the 21st International Conference on ...