Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
| Main Authors: | Adams, Carlisle (Author), Miri, Ali (Author), Wiener, Michael (Author) |
|---|---|
| Corporate Author: | SAC (Conference) Ottawa, Ont.) |
| Format: | Conference Proceeding Book |
| Published: |
Berlin ; New York
Springer
c2007
|
| Series: | Lecture notes in computer science
4356 LNCS sublibrary. SL 4, Security and cryptology |
| Subjects: |
Similar Items
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Algorithms and data structures 10th international workshop, WADS 2007, Halifax, Canada, August 15-17, 2007 proceedings
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2008)
by: Hoffstein, Jeffrey, et al.
Published: (2008)
Working paper workshop on derivatives fundamental in banking and finance
Secure video transmission using steganography and cryptography
by: Maizatul Auni Mazhar
by: Maizatul Auni Mazhar
Wiley survival guide in global telecommunications broadband access, optical components, and networks, and cryptography
by: Desurvire, Emmanuel 1955-
Published: (2004)
by: Desurvire, Emmanuel 1955-
Published: (2004)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
New foundations for Asian and Pacific security based on the addresses, papers, reports, and discussion sessions of an international conference held at Pattaya, Thailand, December 12-16, 1979
by: Larson, Joyce E.
Published: (1980)
by: Larson, Joyce E.
Published: (1980)
Selected papers from the 14th International Symposium on Theoretical Electrical Engineering, ISTET 20
by: Gratkowski, Stanislaw, et al.
Published: (2009)
by: Gratkowski, Stanislaw, et al.
Published: (2009)
Property and security selected essays
by: Bennett Moses, Lyria, et al.
Published: (2010)
by: Bennett Moses, Lyria, et al.
Published: (2010)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
Water for urban areas challenges and perspectives
by: Biswas, Asit K., et al.
Published: (2003)
by: Biswas, Asit K., et al.
Published: (2003)
Advanced data mining and applications third international conference, ADMA 2007, Harbin, China, August 6-8, 2007 : proceedings
by: Alhajj, Reda
Published: (2007)
by: Alhajj, Reda
Published: (2007)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Globalization in the 21st century how interconnected is the world?
Published: (2008)
Published: (2008)
Advances in grinding and abrasive technology XIII selected papers from the 13th Conference on Abrasive Technology in China, 20th-22nd August 2005, Shenyang, China
by: Cai, Guangqi, et al.
Published: (2006)
by: Cai, Guangqi, et al.
Published: (2006)
UiTM International Conference on e-Learning, 12th-14th December 2007, Annexe Hall, UiTM Shah Alam, Malaysia [
Published: (2007)
Published: (2007)
Education and research for marketing and quality management in libraries satellite meeting/colloque satellite : Quebec, August 14-16 Aout 2001
by: Savard, Rejean 1950-
Published: (2002)
by: Savard, Rejean 1950-
Published: (2002)
Multimedia content analysis and mining international workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007 proceedings
by: Sebe, Nicu
Published: (2007)
by: Sebe, Nicu
Published: (2007)
Web information systems and technologies International Conferences, WEBIST 2005 and WEBIST 2006 revised selected papers
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
by: Cordeiro, Jose' (Jose' Anto'nio Moinhos), et al.
Published: (2007)
Similar Items
-
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007) -
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010) -
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)