Filter
Datakryptering
Filter
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June …
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in …
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 …
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military applications. These networks were …
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be …
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, …
Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication …
Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that …