×

zbMATH — the first resource for mathematics

Found 309 Documents (Results 1–100)

100
MathJax
Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 225-241 (2020).
MSC:  94A60 68T05
PDF BibTeX XML Cite
Full Text: DOI
Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 457-469 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 99-119 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 489-519 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 441-471 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-17252-7/pbk; 978-3-030-17253-4/ebook). Lecture Notes in Computer Science 11442, 496-515 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-17252-7/pbk; 978-3-030-17253-4/ebook). Lecture Notes in Computer Science 11442, 466-495 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-17252-7/pbk; 978-3-030-17253-4/ebook). Lecture Notes in Computer Science 11442, 436-465 (2019).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 44-61 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 19-40 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chandra, Peeyush (ed.) et al., Information technology and applied mathematics. ICITAM 2017, Haldia Institute of Technology, Haldia, India, October 30 – November 1, 2017. Singapore: Springer. Adv. Intell. Syst. Comput. 699, 3-22 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 3-19 (2019).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 426-441 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 339-351 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 210-221 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 205-209 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-76952-3/pbk; 978-3-319-76953-0/ebook). Lecture Notes in Computer Science 10808, 435-451 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 253-282 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 221-250 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 190-220 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 62-92 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 111-128 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-98112-3/pbk; 978-3-319-98113-0/ebook). Lecture Notes in Computer Science 11035, 563-582 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 520-538 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 265-283 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 535-564 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 32-61 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 215-230 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 227-246 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 147-167 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 432-449 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 112-129 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 23-41 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 223-239 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 207-222 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 87-102 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Year of Publication
all top 3
Classification
all top 3
Software