Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006
| Main Authors: | Biham, Eli (Author), Youssef, Amr M. (Author) |
|---|---|
| Corporate Author: | SAC (Conference) Montre´al, Que´bec) |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4356 |
| Subjects: | |
| Online Access: | Table of contents |
Similar Items
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Computers and games 5th international conference, CG 2006, Turin, Italy, May 29-31, 2006: revised papers
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Algorithms and data structures 10th international workshop, WADS 2007, Halifax, Canada, August 15-17, 2007 proceedings
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
Statistical network analysis models, issues, and new directions ICML 2006 Workshop on Statistical Network Analysis, Pittsburgh, PA, USA, June 29, 2006 revised selected papers
by: Airoldi, Edoardo
Published: (2007)
by: Airoldi, Edoardo
Published: (2007)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Vision modeling and visualization 2006 proceedings, November 22-24, 2006, Aachen, Germany
by: Kobbelt, L. (Leif)
Published: (2006)
by: Kobbelt, L. (Leif)
Published: (2006)
Graphics Interface 2011 St. John's, Newfoundland, Canada, 25-27 May 2011 : proceedings
by: Brooks, Stephen, et al.
Published: (2011)
by: Brooks, Stephen, et al.
Published: (2011)
Web information systems and technologies International Conferences, WEBIST 2005 and WEBIST 2006 revised selected papers
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
UnixTech '90 International Seminar on UNIX-Here Today, Gone Tomorrow? University Malaya 7th-8th August 1990 organised by MALNIX in cooperation with MIMOS sponsored by Digital IBM
by: Mohamed Awang Lah
Published: (1990)
by: Mohamed Awang Lah
Published: (1990)
Water for urban areas challenges and perspectives
by: Biswas, Asit K., et al.
Published: (2003)
by: Biswas, Asit K., et al.
Published: (2003)
Computational modelling of objects represented in images fundamentals, methods and applications proceedings of the International Symposium CompIMAGE 2006, Coimbra, Portugal, 20-21 October 2006
by: Jorge, Renato M. Natal, et al.
Published: (2007)
by: Jorge, Renato M. Natal, et al.
Published: (2007)
Advances in grinding and abrasive technology XIII selected papers from the 13th Conference on Abrasive Technology in China, 20th-22nd August 2005, Shenyang, China
by: Cai, Guangqi, et al.
Published: (2006)
by: Cai, Guangqi, et al.
Published: (2006)
Proceedings of the 11th Italian Conference on Sensors and Microsystems, Lecce, Italy, 8-10 February 2006
by: Siciliano, P. (Pietro)
Published: (2008)
by: Siciliano, P. (Pietro)
Published: (2008)
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
Proceeding of the 21st National Symposium on Mathematical Sciences(SKSM21): Germination of Mathematical Sciences Education and Research towards Global Sustainability/
by: Mohd Tahir Ismail, et al.
Published: (2013)
by: Mohd Tahir Ismail, et al.
Published: (2013)
Formal concept analysis 6th international conference, ICFCA 2008, Montreal, Canada, February 25-28, 2008 ; proceedings
by: Medina, Raoul, et al.
Published: (2008)
by: Medina, Raoul, et al.
Published: (2008)
Advanced data mining and applications third international conference, ADMA 2007, Harbin, China, August 6-8, 2007 : proceedings
by: Alhajj, Reda
Published: (2007)
by: Alhajj, Reda
Published: (2007)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Enterprise information systems 8th International Conference, ICEIS 2006, Pahpos, Cyprus, May 23-27, 2006 : revised selected papers
by: Manolopoulos, Yannis 1957-
Published: (2008)
by: Manolopoulos, Yannis 1957-
Published: (2008)
Complex systems task group summaries ; Conference, Arnold and Mabel Beckman Center, Irvine, California, November 13-15, 2008
Published: (2009)
Published: (2009)
Parallel computing : architectures,algorithms and applications
by: Bischof, Christian
Published: (2008)
by: Bischof, Christian
Published: (2008)
Similar Items
-
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007) -
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011) -
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)