×

zbMATH — the first resource for mathematics

Found 66 Documents (Results 1–66)

100
MathJax
Lecture Notes in Computer Science 12248. Cham: Springer (ISBN 978-3-030-55303-6/pbk; 978-3-030-55304-3/ebook). xvi, 676 p. (2020).
PDF BibTeX XML Cite
Full Text: DOI
Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 588-606 (2019).
PDF BibTeX XML Cite
Full Text: DOI
Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 362-380 (2019).
PDF BibTeX XML Cite
Full Text: DOI
Lecture Notes in Computer Science 11947. Cham: Springer (ISBN 978-3-030-35868-6/pbk; 978-3-030-35869-3/ebook). x, 237 p. (2019).
PDF BibTeX XML Cite
Full Text: DOI
Lecture Notes in Computer Science 11547. Cham: Springer (ISBN 978-3-030-21547-7/pbk; 978-3-030-21548-4/ebook). xiv, 688 p. (2019).
PDF BibTeX XML Cite
Full Text: DOI
Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 106-126 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 130-150 (2016).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI
Wakayama, Masato (ed.) et al., The impact of applications on mathematics. Proceedings of the Forum of Mathematics for Industry, “Math-for-Industry 2013”, Fukuoka, Japan, November 4–8, 2013. Tokyo: Springer (ISBN 978-4-431-54906-2/hbk; 978-4-431-54907-9/ebook). Mathematics for Industry 1, 85-95 (2014).
PDF BibTeX XML Cite
Full Text: DOI
Wiesbaden: Springer Vieweg; Kassel: Univ. Kassel (Diss. 2013) (ISBN 978-3-658-07115-8/pbk; 978-3-658-07116-5/ebook). xvi, 362 p. (2014).
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 438-445 (2014).
MSC:  94A60 68P25 68M12
PDF BibTeX XML Cite
Full Text: DOI
Berichte aus der Kommunikationstechnik; TIK-Schriftenreihe 125. Aachen: Shaker Verlag; Zürich: ETH Eidgenössische Technische Hochschule Zürich (Diss. ETH No. 19683) (ISBN 978-3-8440-0245-4/pbk). xvii, 186 p. (2011).
PDF BibTeX XML Cite
Full Text: Link
Hlinený, Petr (ed.) et al., Annual doctoral workshop on mathematical and engineering methods in computer science (MEMICS’09). Selected papers based on the presentations at the workshop, November 13-15, 2009, Znojmo, Czech Republic. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-15-6). OASIcs – OpenAccess Series in Informatics 13, 1-9, electronic only (2009).
MSC:  91E45 05C90 68P25
PDF BibTeX XML Cite
Full Text: DOI
Torra, Vicenç (ed.) et al., Modeling decisions for artificial intelligence. 5th international conference, MDAI 2008, Sabadell, Spain, October 30–31, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88268-8/pbk). Lecture Notes in Computer Science 5285. Lecture Notes in Artificial Intelligence, 227-238 (2008).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI
Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 374-375 (2007).
MSC:  68M14 94A60 68P20
PDF BibTeX XML Cite
Full Text: DOI
Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 223-240 (2005).
PDF BibTeX XML Cite
Full Text: DOI
Jajodia, Sushil (ed.) et al., Data and applications security XIX. 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, USA, August 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28138-X/pbk). Lecture Notes in Computer Science 3654, 153-165 (2005).
MSC:  68P25 68T05
PDF BibTeX XML Cite
Full Text: DOI
Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 495-507 (2004).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
IFIP, International Federation for Information Processing 144. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-8127-8/hbk). xii, 384 p. (2004).
PDF BibTeX XML Cite
Lecture Notes in Computer Science. 2727. Berlin: Springer. xii, 534 p. (2003).
PDF BibTeX XML Cite
Full Text: Link
IFIP, International Federation for Information Processing. 122. Boston, MA: Kluwer Academic Publishers. xviii, 494 p. (2003).
PDF BibTeX XML Cite
Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 492-501 (2001).
PDF BibTeX XML Cite
Full Text: DOI
Federrath, Hannes (ed.), Designing privacy enhancing technologies. International workshop on design issues in anonymity and unobservability. Berkeley, CA, USA, July 25-26, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2009, 96-140 (2001).
MSC:  68U99 68P25 68M10
PDF BibTeX XML Cite
Full Text: Link
Lecture Notes in Computer Science. 1438. Berlin: Springer. xi, 423 p. (1998).
PDF BibTeX XML Cite
Full Text: DOI
Wright, Rebecca N. (ed.) et al., Network threats. DIMACS workshop, New Brunswick, NJ, USA, December 2–4, 1996. Providence, RI: AMS, American Mathematical Society. DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 11-20 (1998).
MSC:  68P25 68M99 68M10
PDF BibTeX XML Cite
Lecture Notes in Computer Science. 1270. Berlin: Springer. xi, 337 p. (1997).
PDF BibTeX XML Cite
Lecture Notes in Computer Science. 1172. Berlin: Springer. ix, 331 p. (1996).
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Year of Publication
all top 3
Classification
all top 3
Software