Data Structures, Cryptology and Information Theory.
Overview
Works: | 363 works in 184 publications in 184 languages |
---|
Titles
Digital Video and Audio Broadcasting Technology :A Practical Engineering Guide /
by:
(Electronic resources)
Certification and Security in Inter-Organizational E-ServicesIFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Electronic resources)
Developing Ambient IntelligenceProceedings of the First International Conference on Ambient Intelligence Developments (AmID'06) /
by:
(Electronic resources)
Theoretical Computer Science (vol. # 3895)Essays in Memory of Shimon Even /
by:
(Electronic resources)
Automata, Languages and Programming (vol. # 4051)33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings.Part I /
by:
(Electronic resources)
Automata, Languages and Programming (vol. # 4052)33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings.Part II /
by:
(Electronic resources)
Data Analysis, Classification and the Forward SearchProceedings of the Meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, University of Parma, June 6-8, 2005 /
by:
(Electronic resources)
Terrorism InformaticsKnowledge Management and Data Mining for Homeland Security /
by:
(Electronic resources)
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
by:
(Electronic resources)
Automata, Languages and Programming32nd International Colloquim, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings /
by:
(Electronic resources)
Automata, Languages and Programming35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I /
by:
(Electronic resources)
Automata, Languages and Programming35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II /
by:
(Electronic resources)
Fast Software Encryption15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Electronic resources)
E-Business and Telecommunication NetworksThird International Conference, ICETE 2006, Setubal, Portugal, August 7-10, 2006. Selected Papers /
by:
(Electronic resources)
Pairing-Based Cryptography -- Pairing 2008Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(Electronic resources)
Advances in Ad Hoc NetworkingProceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 /
by:
(Electronic resources)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Mathematical methods in computer scienceessays in memory of Thomas Beth /
by:
(Language materials, printed)
Digital watermarking6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Language materials, printed)
Mapping nanotechnology innovations and knowledgeglobal and longitudinal patent and literature analysis /
by:
(Electronic resources)
Transactions on computational science IVspecial issue on security in computing /
by:
(Electronic resources)
Applied cryptography and network security7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Electronic resources)
Formal to practical securitypapers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Electronic resources)
Emerging challenges for security, privacy and trust24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(Electronic resources)
Trust Management IIIThird IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings /
by:
(Electronic resources)
Applied computing, computer science, and advanced communicationFirst International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, June 6 - 7, 2009 : proceedings /
by:
(Electronic resources)
Advances in information security and its applicationthird international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Experimental algorithms8th international symposium, SEA 2009, Dortmund, Germany, June 4-6, 2009 : proceedings /
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Future Multimedia NetworkingSecond International Workshop, FMN 2009, Coimbra, Portugal, June 22-23, 2009. Proceedings /
by:
(Electronic resources)
Advances in information security and assurancethird international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Fast Software Encryption16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(Electronic resources)
Pro Javascript Ria Techniquesbest practices, performance and presentation /
by:
(Electronic resources)
Contemporary computingsecond international conference, IC3 2009, Noida, India, August 17-19, 2009 : proceedings /
by:
(Electronic resources)
Global security, safety, and sustainability5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Personal Satellite ServicesInternational Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(Electronic resources)
Computational logic in multi-agent systemsb9th international workshop, CLIMA IX, Dresden, Germany, September 29-30, 2008 ; revised selected and invited papers /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2009Third International Conference Palo Alto, CA, USA, August 12-14, 2009 : Proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 200929th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 : Proceedings /
by:
(Electronic resources)
Digital watermarking8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(Electronic resources)
String processing and information retrieval16th International Symposium, SPIRE 2009 Saariselka, Finland, August 25-27, 2009 Proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Security and privacy in mobile information and communication systemsFirst International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009 : revised selected papers /
by:
(Electronic resources)
Foundations and applications of security analysisJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers /
by:
(Electronic resources)
Engineering stochastic local search algorithmsdesigning, implementing and analyzing effective heuristics, Second International Workshop, SLS 2009, Brussels, Belgium, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Information security theory and practicesmart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 200911th international workshop, Lausanne, Switzerland, September 6-9, 2009 : proceedings /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks8th international conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 : proceedings /
by:
(Electronic resources)
Information hiding11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(Electronic resources)
Computer security - ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Digital watermarking7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(Electronic resources)
Identity and privacy in the internet age14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings /
by:
(Electronic resources)
Security protocols14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Critical Infrastructure Protection IIIthird Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009 : revised selected papers /
by:
(Electronic resources)
Security and Privacy in Communication Networks5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers /
by:
(Electronic resources)
AdvancED Flash on devicesmobile development with Flash Lite and Flash 10 /
by:
(Electronic resources)
Provable securitythird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 200915th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Cryptography and coding12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings /
by:
(Electronic resources)
E-business and telecommunicationsinternational conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
Advances in security technologyInternational Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Database Theory and ApplicationInternational Conference, DTA 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Security TechnologyInternational Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Advances in computer science - ASIAN 2009information security and privacy : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 200910th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Information and communications security11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Security in emerging wireless communication and networking systemsFirst International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Electronic resources)
Information security and digital forensicsFirst International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemssecond international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Electronic resources)
Ad Hoc networksfirst international conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009 : revised selected papers /
by:
(Electronic resources)
High performance networking, computing, communication systems, and mathematical foundationsinternational conferences, ICHCC 2009-ICTMF 2009, Sanya, Hainan Island, China, December 13-14, 2009 : proceedings /
by:
(Electronic resources)
Digital video and audio broadcasting technologya practical engineering guide /
by:
(Electronic resources)
Future multimedia networkingthird international workshop, FMN 2010, Krakow, Poland, June 17-18, 2010 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fieldsthird international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(Electronic resources)
Intelligent knowledge-based systemsbusiness and technology in the new millennium.Volume 1,Knowledge-based systems /
by:
(Electronic resources)
Permutation complexity in dynamical systemsordinal patterns, permutation entropy and all that /
by:
(Electronic resources)
The business of iPhone app developmentmaking and marketing apps that succeed /
by:
(Electronic resources)
Recent advances in intrusion detection13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Electronic resources)
Cryptology and network security9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Electronic resources)
Critical infrastructure protection IVFourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, revised selected papers /
by:
(Electronic resources)
Policies and research in identity managementSecond IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings /
by:
(Electronic resources)
Information and communications security12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201012th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Digital watermarking9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemsthird International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Voice over IP securitya comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
Multimedia communications, services and security4th International Conference, MCSS 2011, Krakow, Poland, June 2-3, 2011 : proceedings /
by:
(Electronic resources)
Applied informatics and communicationinternational conference, ICAIC 2011, Xi'an, China, August 20-21, 2011 : proceedings.Part II /
by:
(Electronic resources)
Applied informatics and communicationinternational conference, ICAIC 2011, Xi'an, China, August 20-21, 2011 : proceedings.Part V /
by:
(Electronic resources)
Applied informatics and communicationinternational conference, ICAIC 2011, Xi'an, China, August 20-21, 2011 : proceedings.Part IV /
by:
(Electronic resources)
Applied informatics and communicationinternational conference, ICAIC 2011,Xi'an, China, August 20-21, 2011 : proceedings.Part I /
by:
(Electronic resources)
Applied informatics and communicationinternational conference, ICAIC 2011, Xi'an, China, August 20-21, 2011 : proceedings.Part III /
by:
(Electronic resources)
Information security and assuranceinternational conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systemsCHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
High performance networking, computing, and communication systemssecond international conference, ICHCC 2011, Singapore, May 5-6, 2011, selected papers /
by:
(Electronic resources)
Theoretical and mathematical foundations of computer sciencesecond international conference, ICTMF 2011, Singapore, May 5-6, 2011, selected papers /
by:
(Electronic resources)
Programming for engineersa foundational approach to learning C and Matlab /
by:
(Electronic resources)
Information and communications security13th international conference, ICICS 2011, Beijing, China, November 23-26, 2011 : proceedings /
by:
(Electronic resources)
Cryptography and coding13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010 : revised selected papers /
by:
(Electronic resources)
Information security technology for applications15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Information security technology for applications16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Applications of algebra to communications, control, and signal processing
by:
(Electronic resources)
Theory and applications of models of computation9th annual conference, TAMC 2012, Beijing, China, May 16-21, 2012 : proceedings /
by:
(Electronic resources)
Information security theory and practicesecurity, privacy and trust in computing systems and ambient intelligent ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 20125th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 : proceedings /
by:
(Electronic resources)
Progress in VLSI design and test16th International Symposium, VDAT 2012, Shibpur, India, July 1-4, 2012 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fields4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(Electronic resources)
Digital forensics and watermarking10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011 : revised selected papers /
by:
(Electronic resources)
Engineering secure two-party computation protocolsdesign, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Information technology convergence, secure and trust computing, and data managementITCS 2012 & STA 2012 /
by:
(Electronic resources)
Communications and multimedia security8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201214th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
ISSE 2006securing electronic business processes : highlights of the Information Security Solutions Europe 2006 Conference /
by:
(Language materials, printed)
Information and communications security14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
Network and parallel computingIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(Electronic resources)
E-Business and telecommunicationsInternational Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Beginning Oracle Database 11g administrationfrom novice to professional /
by:
(Electronic resources)
Intelligent computing, networking, and informaticsproceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013 /
by:
(Electronic resources)
Applied algorithmsfirst International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014 : proceedings /
by:
(Electronic resources)
Biometrics in the new worldthe cloud, mobile technology and pervasive identity /
by:
(Electronic resources)
Engineering secure software and systems6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings /
by:
(Electronic resources)
Information and communication technologysecond IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 : proceedings /
by:
(Electronic resources)
Theory and applications of models of computation11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014 : proceedings /
by:
(Electronic resources)
Knowledge-based driver assistance systemstraffic situation description and situation feature relevance /
by:
(Electronic resources)
Trustworthy reconfigurable systemsenhancing the security capabilities of reconfigurable hardware architectures /
by:
(Electronic resources)
Authentication in insecure environmentsusing visual cryptography and non-transferable credentials in practise /
by:
(Language materials, printed)
Distributed computing28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014 : proceedings /
by:
(Language materials, printed)
High-dimensional and low-quality visual information processingfrom structured sensing and understanding /
by:
(Electronic resources)
Theory and applications of models of computation12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015 : proceedings /
by:
(Electronic resources)
Energy time series forecastingefficient and accurate forecasting of evolving time series from the energy domain /
by:
(Electronic resources)
IT security risk management in the context of cloud computingtowards an understanding of the key role of providers' IT security risk perceptions /
by:
(Electronic resources)
Distributed computing29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015 : proceedings /
by:
(Electronic resources)
Quantum information processing with finite resourcesmathematical foundations /
by:
(Electronic resources)
Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16')
by:
(Electronic resources)
Information technologynew generations : 13th International Conference on Information Technology /
by:
(Electronic resources)
PMP examination practice questions400 practice questions and answers to help you pass /
by:
(Electronic resources)
Compression-based methods of statistical analysis and prediction of time series
by:
(Electronic resources)
Image analysis and recognition13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Povoa de Varzim, Portugal, July 13-15, 2016 : proceedings /
by:
(Electronic resources)
Cryptology transmitted message protectionfrom deterministic chaos up to optical vortices /
by:
(Electronic resources)
Control modes on mobile software platformsempirical studies on the importance of informal control /
by:
(Electronic resources)
Banking beyond banks and moneya guide to banking services in the twenty-first century /
by:
(Electronic resources)
Analyzing time interval dataintroducing an information system for time interval data analysis /
by:
(Electronic resources)
Distributed computing30th International Symposium, DISC 2016, Paris, France, September 27-29, 2016 : proceedings /
by:
(Electronic resources)
Computer vision - ACCV 2016 WorkshopsACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.Part I /
by:
(Electronic resources)
Computer vision - ACCV 2016 WorkshopsACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.Part II /
by:
(Electronic resources)
Computer vision - ACCV 2016 WorkshopsACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016 : revised selected papers.Part III /
by:
(Electronic resources)
Architectural transformations in network services and distributed systems
by:
(Electronic resources)
Tutorials on the foundations of cryptographydedicated to Oded Goldreich /
by:
(Electronic resources)
Compressive sensing for the photonic mixer devicefundamentals, methods and results /
by:
(Electronic resources)
Image analysis and recognition14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5-7, 2017 : proceedings /
by:
(Electronic resources)
Security of networks and services in an all-connected world11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017 : proceedings /
by:
(Electronic resources)
Computational science and its applications - ICCSA 201717th International Conference, Trieste, Italy, July 3-6, 2017 : proceedings.Part I /
by:
(Electronic resources)
Computational intelligence, communications, and business analyticsfirst International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017 : revised selected papers.Part I /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017 : proceedings /
by:
(Electronic resources)
Verifiable composition of signature and encryptiona comprehensive study of the design paradigms /
by:
(Electronic resources)
Computational intelligence, communications, and business analyticsfirst International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017 : revised selected papers.Part II /
by:
(Electronic resources)
Innovative security solutions for information technology and communications10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017 : revised selected papers /
by:
(Electronic resources)
Autonomous agents and multiagent systemsAAMAS 2017 Workshops, Best Papers, Sao Paulo, Brazil, May 8-12, 2017 : revised selected papers /
by:
(Electronic resources)
Information systems security13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings /
by:
(Electronic resources)
Mathematical modelling for next-generation cryptographyCREST Crypto-Math Project /
by:
(Electronic resources)
Data Science Analytics and ApplicationsFirst International Conference, DaSAA 2017, Chennai, India, January 4-6, 2017 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers /
by:
(Electronic resources)
Quality, reliability, security and robustness in heterogeneous systems13th International Conference, QShine 2017, Dalian, China, December 16 -17, 2017 : proceedings /
by:
(Electronic resources)
Genetic programming21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018 : proceedings /
by:
(Electronic resources)
Information technology - new generations15th International Conference on Information Technology /
by:
(Electronic resources)
Principles of security and trust7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018 : proceedings /
by:
(Electronic resources)
Social, cultural and behavioral modeling11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018 : proceedings /
by:
(Electronic resources)
Combinatorial algorithms29th International Workshop, IWOCA 2018, Singapore, July 16-19, 2018 : proceedings /
by:
(Electronic resources)
Creating value from data sharingfuture-oriented business models in theory and practice /
by:
(Electronic resources)
e-Infrastructure and e-Services for Developing Countries9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017 : proceedings /
by:
(Electronic resources)
Advances in digital forensics XIV14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018 : revised selected papers /
by:
(Electronic resources)
Management perspective for transport telematics18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018 : selected papers /
by:
(Electronic resources)
Information security education - towards a cybersecure society11th IFIP WG 11.8 World Conference, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018 : proceedings /
by:
(Electronic resources)
Biometric recognition13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018 : proceedings /
by:
(Electronic resources)
Principles and practice of constraint programming24th International Conference, CP 2018, Lille, France, August 27-31, 2018 : proceedings /
by:
(Electronic resources)
Developments in language theory22nd International Conference, DLT 2018, Tokyo, Japan, September 10-14, 2018 : proceedings /
by:
(Electronic resources)
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
by:
(Electronic resources)
Cloud Computing and Security4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 : revised selected papers.Part III /
by:
(Electronic resources)
Advanced concepts for intelligent vision systems19th International Conference, ACIVS 2018, Poitiers, France, September 24-27, 2018 : proceedings /
by:
(Electronic resources)
Cloud computing and security4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 : revised selected papers.Part V /
by:
(Electronic resources)
Practical PHP 7, MySQL 8, and MariaDB website databasesa simplified approach to developing database-driven websites /
by:
(Electronic resources)
Machine learning and intelligent communicationsthird International Conference, MLICOM 2018, Hangzhou, China, July 6-8, 2018 : proceedings /
by:
(Electronic resources)
Advances in computing and data sciencessecond International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018 : revised selected papers.Part I /
by:
(Electronic resources)
Advances in computing and data sciencessecond International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018 : revised selected papers.Part II /
by:
(Electronic resources)
Provable security12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018 : proceedings /
by:
(Electronic resources)
Cloud computing and security4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 : revised selected papers.Part I /
by:
(Electronic resources)
Information and communications security20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018 : proceedings /
by:
(Electronic resources)
Proceedings of International Ethical Hacking Conference 2018eHaCON 2018, Kolkata, India /
by:
(Electronic resources)
Show more
Fewer
Subjects