×

zbMATH — the first resource for mathematics

Found 115 Documents (Results 1–100)

100
MathJax
Probl. Inf. Transm. 57, No. 1, 33-53 (2021); translation from Probl. Peredachi Inf. 57, No. 1, 40-63 (2021).
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 445-458 (2018).
MSC:  94A60 68M10
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 3-19 (2018).
MSC:  94A16 94A60 68M11
PDF BibTeX XML Cite
Full Text: DOI
Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 490-509 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 399-416 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 141-161 (2018).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI
Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 74-83 (2017).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI
Kropatsch, Walter G. (ed.) et al., Discrete geometry for computer imagery. 20th IAPR international conference, DGCI 2017, Vienna, Austria, September 19–21, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10502, 135-146 (2017).
MSC:  68U05 68P20 94A16
PDF BibTeX XML Cite
Full Text: DOI
Proceedings of the 2017 ACM symposium on principles of distributed computing, PODC ’17, Washington, DC, USA, July 25–27, 2017. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4992-5). 73-82 (2017).
MSC:  68M14 68P15 68P20
PDF BibTeX XML Cite
Full Text: DOI
Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 227-247 (2017).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 106-126 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 153-172 (2016).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 19-38 (2016).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI
Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 24-43 (2016).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 153-169 (2016).
MSC:  94A60 68M11
PDF BibTeX XML Cite
Full Text: DOI
Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 301-321 (2016).
MSC:  94A60 68M11
PDF BibTeX XML Cite
Full Text: DOI
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 377-394 (2015).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 1-18 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, South Korea, November 27–29, 2013. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8565, 49-66 (2014).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Gu, Qianping (ed.) et al., Algorithmic aspects in information and management. 10th international conference, AAIM 2014, Vancouver, BC, Canada, July 8–11, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07955-4/pbk). Lecture Notes in Computer Science 8546, 185-196 (2014).
MSC:  68P05 68P20 68T05
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 115-130 (2014).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8479, 97-115 (2014).
MSC:  68P25 68M11
PDF BibTeX XML Cite
Full Text: DOI
Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 13-30 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’13, Rome, Italy, January 23–25, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1832-7). 101-114 (2013).
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Year of Publication
all top 3
Classification
all top 3
Software