×

zbMATH — the first resource for mathematics

Found 443 Documents (Results 1–100)

100
MathJax
Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 104-123 (2020).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 23-43 (2019).
MSC:  94A62 68Q60
PDF BibTeX XML Cite
Full Text: DOI
Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21567-5/pbk; 978-3-030-21568-2/ebook). Lecture Notes in Computer Science 11464, 550-570 (2019).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-12611-7/pbk; 978-3-030-12612-4/ebook). Lecture Notes in Computer Science 11405, 149-168 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 805-816 (2018).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 287-302 (2018).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI
Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 39-50 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-76952-3/pbk; 978-3-319-76953-0/ebook). Lecture Notes in Computer Science 10808, 470-490 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 647-657 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lotker, Zvi (ed.) et al., Structural information and communication complexity. 25th international colloquium, SIROCCO 2018, Ma’ale HaHamisha, Israel, June 18–21, 2018. Revised selected papers. Cham: Springer (ISBN 978-3-030-01324-0/pbk; 978-3-030-01325-7/ebook). Lecture Notes in Computer Science 11085, 178-192 (2018).
MSC:  68Mxx 68R10
PDF BibTeX XML Cite
Full Text: DOI
Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 23-42 (2018).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI
Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 497-515 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 259-293 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer (ISBN 978-981-10-4641-4/pbk; 978-981-10-4642-1/ebook). Communications in Computer and Information Science 655, 26-33 (2017).
MSC:  68M25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer (ISBN 978-981-10-4641-4/pbk; 978-981-10-4642-1/ebook). Communications in Computer and Information Science 655, 16-25 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Kabatiansky, Grigory (ed.) et al., Algebraic and combinatorial coding theory – 2016. Selected papers from the 15th international workshop (ACCT-XV), Albena, Bulgaria, June 18–24, 2016. Amsterdam: Elsevier. Electron. Notes Discrete Math. 57, 199-204 (2017).
MSC:  94B05 05C90
PDF BibTeX XML Cite
Full Text: DOI
Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 304-335 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 474-477 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 463-473 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 373-403 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 101-131 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 137-155 (2016).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 223-239 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 207-222 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 359-372 (2016).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 333-344 (2016).
MSC:  94A60 68U10
PDF BibTeX XML Cite
Full Text: DOI
Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 225-241 (2015).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 263-286 (2015).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Serial
all top 5
Year of Publication
all top 3
Classification
all top 3
Software