×

zbMATH — the first resource for mathematics

Found 368 Documents (Results 1–100)

100
MathJax
Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 150-164 (2020).
MSC:  68M25
PDF BibTeX XML Cite
Full Text: DOI
Probl. Inf. Transm. 56, No. 1, 73-90 (2020); translation from Probl. Peredachi Inf. 56, No. 1, 80-98 (2020).
MSC:  60K25 68M20
PDF BibTeX XML Cite
Full Text: DOI
Mat. Teor. Igr Prilozh. 11, No. 3, 5-30 (2019); translation in Autom. Remote Control 81, No. 4, 731-745 (2020).
MSC:  91B26 91B24
PDF BibTeX XML Cite
Full Text: MNR
Phung-Duc, Tuan (ed.) et al., Queueing theory and network applications. 14th international conference, QTNA 2019, Ghent, Belgium, August 27–29, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11688, 369-378 (2019).
MSC:  68M20
PDF BibTeX XML Cite
Full Text: DOI
Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 355-371 (2019).
MSC:  94A60 94A62 68M11
PDF BibTeX XML Cite
Full Text: DOI
Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 347-354 (2019).
MSC:  94A60 68M11
PDF BibTeX XML Cite
Full Text: DOI
Gopal, T. V. (ed.) et al., Theory and applications of models of computation. 15th annual conference, TAMC 2019, Kitakyushu, Japan, April 13–16, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-14811-9/pbk; 978-3-030-14812-6/ebook). Lecture Notes in Computer Science 11436, 501-517 (2019).
MSC:  68Q05
PDF BibTeX XML Cite
Full Text: DOI
Amsterdam: Elsevier/Academic Press (ISBN 978-0-12-816551-5/pbk; 978-0-12-816552-2/ebook). xiii, 308 p. (2019).
PDF BibTeX XML Cite
Full Text: DOI
Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 274-288 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 223-239 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lotker, Zvi (ed.) et al., Structural information and communication complexity. 25th international colloquium, SIROCCO 2018, Ma’ale HaHamisha, Israel, June 18–21, 2018. Revised selected papers. Cham: Springer (ISBN 978-3-030-01324-0/pbk; 978-3-030-01325-7/ebook). Lecture Notes in Computer Science 11085, 377-391 (2018).
MSC:  68Mxx 68R10
PDF BibTeX XML Cite
Full Text: DOI
Computational Biology 28. Cham: Springer (ISBN 978-3-319-98838-2/hbk; 978-3-319-98839-9/ebook). xxvi, 315 p. (2018).
PDF BibTeX XML Cite
Full Text: DOI
Mosc. Univ. Comput. Math. Cybern. 42, No. 1, 39-43 (2018); translation from Vestn. Mosk. Univ., Ser. XV 2018, No. 1, 40-45 (2018).
MSC:  68P15 68P25
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 759-767 (2018).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 431-451 (2018).
MSC:  68P27
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 399-416 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Takahashi, Yutaka (ed.) et al., Queueing theory and network applications. 13th international conference, QTNA 2018, Tsukuba, Japan, July 25–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93735-9/pbk; 978-3-319-93736-6/ebook). Lecture Notes in Computer Science 10932, 133-141 (2018).
MSC:  90B22 60K25 60J10
PDF BibTeX XML Cite
Full Text: DOI
Takahashi, Yutaka (ed.) et al., Queueing theory and network applications. 13th international conference, QTNA 2018, Tsukuba, Japan, July 25–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93735-9/pbk; 978-3-319-93736-6/ebook). Lecture Notes in Computer Science 10932, 115-123 (2018).
MSC:  90B22 60K25 90B35
PDF BibTeX XML Cite
Full Text: DOI
Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 141-161 (2018).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI
Ferrarotti, Flavio (ed.) et al., Foundations of information and knowledge systems. 10th international symposium, FoIKS 2018, Budapest, Hungary, May 14–18, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-90049-0/pbk; 978-3-319-90050-6/ebook). Lecture Notes in Computer Science 10833, 77-96 (2018).
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Serial
all top 5
Year of Publication
all top 3
Classification
all top 3
Software