Data Structures, Cryptology and Information Theory.
Overview
Works: | 263 works in 130 publications in 130 languages |
---|
Titles
Automata, Languages and Programming = 32nd International Colloquim, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings /
by:
(Language materials, printed)
Certification and Security in Inter-Organizational E-Services = IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Language materials, printed)
Methods and Models in Transport and Telecommunications = Cross Atlantic Perspectives /
by:
(Language materials, printed)
Image and Video Encryption = From Digital Rights Management to Secured Personal Communication /
by:
(Language materials, printed)
Privacy, Security and Trust within the Context of Pervasive Computing
by:
(Language materials, printed)
Formal Aspects in Security and Trust = IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Language materials, printed)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(Language materials, printed)
Security and Privacy in the Age of Ubiquitous Computing = IFIP TC11 20th International Information Security Conference May 30-June 1, 2005, Chiba, Japan /
by:
(Language materials, printed)
Cyberspace Security and Defense: Research Issues = Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6-9 September 2004/
by:
(Language materials, printed)
Evolutionary Multiobjective Optimization = Theoretical Advances and Applications /
by:
(Language materials, printed)
Classification, the Ubiquitous Challenge = Proceedings of the 28th Annual Conference of the Gesellschaft fur Klassifikation e.V. University of Dortmund, March 9-11, 2004 /
by:
(Language materials, printed)
Policies and Research in Identity Management = First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007/
by:
(Language materials, printed)
VizSEC 2007 = Proceedings of the Workshop on Visualization for Computer Security /
by:
(Language materials, printed)
Digital Video and Audio Broadcasting Technology = A Practical Engineering Guide /
by:
(Language materials, printed)
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
by:
(Language materials, printed)
Automata, Languages and Programming = 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I /
by:
(Language materials, printed)
Automata, Languages and Programming = 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II /
by:
(Language materials, printed)
Fast Software Encryption = 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Language materials, printed)
E-Business and Telecommunication Networks = Third International Conference, ICETE 2006, Setubal, Portugal, August 7-10, 2006. Selected Papers /
by:
(Language materials, printed)
Pairing-Based Cryptography -- Pairing 2008 = Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(Language materials, printed)
Advances in Ad Hoc Networking = Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 /
by:
(Language materials, printed)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Digital watermarking = 6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Language materials, printed)
Mapping nanotechnology innovations and knowledge = global and longitudinal patent and literature analysis /
by:
(Language materials, printed)
Transactions on computational science IV = special issue on security in computing /
by:
(Language materials, printed)
Applied cryptography and network security = 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Language materials, printed)
Formal to practical security = papers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Language materials, printed)
Emerging challenges for security, privacy and trust = 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(Language materials, printed)
Understanding cryptography = a textbook for students and practitioners /
by:
(Language materials, printed)
Security in emerging wireless communication and networking systems = First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Language materials, printed)
Digital video and audio broadcasting technology = a practical engineering guide /
by:
(Language materials, printed)
Arithmetic of finite fields = third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(Language materials, printed)
Intelligent knowledge-based systems = business and technology in the new millennium.. Volume 1,. Knowledge-based systems /
by:
(Language materials, printed)
HTML and CSS Web standards solutions = a Web standardistas' approach /
by:
(Language materials, printed)
Recent advances in intrusion detection = 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Language materials, printed)
The business of iPhone app development = making and marketing apps that succeed /
by:
(Language materials, printed)
Critical infrastructure protection IV = Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, revised selected papers/
by:
(Language materials, printed)
Policies and research in identity management = Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings /
by:
(Language materials, printed)
Efficient secure two-party protocols = techniques and constructions /
by:
(Language materials, printed)
Digital watermarking = 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems = third International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications = 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Voice over IP security = a comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
Engineering secure software and systems = 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications = 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010 : revised selected papers /
by:
(Electronic resources)
Information security technology for applications = 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Applications of algebra to communications, control, and signal processing
by:
(Electronic resources)
Arithmetic of finite fields = 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(Electronic resources)
Digital forensics and watermarking = 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011 : revised selected papers /
by:
(Electronic resources)
Engineering secure two-party computation protocols = design, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Information technology convergence, secure and trust computing, and data management = ITCS 2012 & STA 2012 /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Privacy in statistical databases = UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
E-Business and telecommunications = International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Beginning Oracle Database 11g administration = from novice to professional /
by:
(Electronic resources)
Intelligent computing, networking, and informatics = proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013 /
by:
(Electronic resources)
Biometrics in the new world = the cloud, mobile technology and pervasive identity /
by:
(Electronic resources)
Engineering secure software and systems = 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings /
by:
(Electronic resources)
Information and communication technology = second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 : proceedings /
by:
(Electronic resources)
Theory and applications of models of computation = 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014 : proceedings /
by:
(Electronic resources)
Knowledge-based driver assistance systems = traffic situation description and situation feature relevance /
by:
(Electronic resources)
Trustworthy reconfigurable systems = enhancing the security capabilities of reconfigurable hardware architectures /
by:
(Electronic resources)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(Electronic resources)
Distributed computing = 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014 : proceedings /
by:
(Electronic resources)
Theory and applications of models of computation = 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015 : proceedings /
by:
(Electronic resources)
IT security risk management in the context of cloud computing = towards an understanding of the key role of providers' IT security risk perceptions /
by:
(Electronic resources)
Distributed computing = 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015 : proceedings /
by:
(Electronic resources)
Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16')
by:
(Electronic resources)
Information technology = new generations : 13th International Conference on Information Technology /
by:
(Electronic resources)
PMP examination practice questions = 400 practice questions and answers to help you pass /
by:
(Electronic resources)
Compression-based methods of statistical analysis and prediction of time series
by:
(Electronic resources)
Image analysis and recognition = 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Povoa de Varzim, Portugal, July 13-15, 2016 : proceedings /
by:
(Electronic resources)
Banking beyond banks and money = a guide to banking services in the twenty-first century /
by:
(Electronic resources)
Distributed computing = 30th International Symposium, DISC 2016, Paris, France, September 27-29, 2016 : proceedings /
by:
(Electronic resources)
Analyzing time interval data = introducing an information system for time interval data analysis /
by:
(Electronic resources)
Computer vision - ACCV 2016 Workshops = ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.. Part I /
by:
(Electronic resources)
Computer vision - ACCV 2016 Workshops = ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.. Part II /
by:
(Electronic resources)
Computer vision - ACCV 2016 Workshops = ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.. Part III /
by:
(Electronic resources)
Architectural transformations in network services and distributed systems
by:
(Electronic resources)
Tutorials on the foundations of cryptography = dedicated to Oded Goldreich /
by:
(Electronic resources)
Compressive sensing for the photonic mixer device = fundamentals, methods and results /
by:
(Electronic resources)
Computational science and its applications - ICCSA 2017 = 17th International Conference, Trieste, Italy, July 3-6, 2017 : proceedings.. Part I /
by:
(Electronic resources)
Computational intelligence, communications, and business analytics = first International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017 : revised selected papers.. Part I /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks = 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017 : proceedings /
by:
(Electronic resources)
Innovative security solutions for information technology and communications = 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017 : revised selected papers /
by:
(Electronic resources)
Autonomous agents and multiagent systems = AAMAS 2017 Workshops, Best Papers, Sao Paulo, Brazil, May 8-12, 2017 : revised selected papers /
by:
(Electronic resources)
Information systems security = 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings /
by:
(Electronic resources)
Data Science Analytics and Applications = First International Conference, DaSAA 2017, Chennai, India, January 4-6, 2017 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security = 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers /
by:
(Electronic resources)
Genetic programming = 21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018 : proceedings /
by:
(Electronic resources)
Information technology - new generations = 15th International Conference on Information Technology /
by:
(Electronic resources)
Principles of security and trust = 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018 : proceedings /
by:
(Electronic resources)
Combinatorial algorithms = 29th International Workshop, IWOCA 2018, Singapore, July 16-19, 2018 : proceedings /
by:
(Electronic resources)
Proceedings of International Ethical Hacking Conference 2018 = eHaCON 2018, Kolkata, India /
by:
(Electronic resources)
Trust Management II = Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway /
by:
(Language materials, printed)
Terrorism Informatics = Knowledge Management and Data Mining for Homeland Security /
by:
(Language materials, printed)
Mathematical methods in computer science = essays in memory of Thomas Beth /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography
by:
(Language materials, printed)
Information security and digital forensics = First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Language materials, printed)
Engineering secure software and systems = second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Language materials, printed)
Ad Hoc networks = first international conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009 : revised selected papers /
by:
(Language materials, printed)
High performance networking, computing, communication systems, and mathematical foundations = international conferences, ICHCC 2009-ICTMF 2009, Sanya, Hainan Island, China, December 13-14, 2009 : proceedings/
by:
(Language materials, printed)
Future multimedia networking = third international workshop, FMN 2010, Krakow, Poland, June 17-18, 2010 : proceedings /
by:
(Language materials, printed)
Permutation complexity in dynamical systems = ordinal patterns, permutation entropy and all that /
by:
(Language materials, printed)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Language materials, printed)
Information security technology for applications = 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Communications and multimedia security = 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
by:
(Electronic resources)
Theory and applications of models of computation = 9th annual conference, TAMC 2012, Beijing, China, May 16-21, 2012 : proceedings /
by:
(Electronic resources)
Network and parallel computing = IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(Electronic resources)
Applied algorithms = first International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014 : proceedings /
by:
(Electronic resources)
High-dimensional and low-quality visual information processing = from structured sensing and understanding /
by:
(Electronic resources)
Energy time series forecasting = efficient and accurate forecasting of evolving time series from the energy domain /
by:
(Electronic resources)
Quantum information processing with finite resources = mathematical foundations /
by:
(Electronic resources)
Codes, ciphers and spies = tales of military intelligence in World War I /
by:
(Electronic resources)
Cryptology transmitted message protection = from deterministic chaos up to optical vortices /
by:
(Electronic resources)
Control modes on mobile software platforms = empirical studies on the importance of informal control /
by:
(Electronic resources)
Verifiable composition of signature and encryption = a comprehensive study of the design paradigms /
by:
(Electronic resources)
Computational intelligence, communications, and business analytics = first International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017 : revised selected papers.. Part II /
by:
(Electronic resources)
Mathematical modelling for next-generation cryptography = CREST Crypto-Math Project /
by:
(Electronic resources)
Show more
Fewer
Subjects