This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.The 9 full papers and 2 invited papers...More info...
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.The 9 full papers and 2 invited papers...More info...
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in...More info...
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in...More info...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynote...More info...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynote...More info...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy,ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes...More info...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy,ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes...More info...
(Pub. Date: 09-Dec-2012, PDF+DRM, Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642354045)
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selecte...More info...
(Pub. Date: 09-Nov-2009, PDF+DRM, Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642046421)
This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewe...More info...
(Pub. Date: 02-Dec-2008, PDF+DRM, Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783540892557)
This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers prese...More info...
(Pub. Date: 22-Jun-2004, PDF+DRM, Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783540278009)
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked S...More info...
(Pub. Date: 31-Jul-2003, PDF+DRM, Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783540444565)
The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were...More info...