Filter
Informationsteori
Filter
It is our great pleasure to welcome you to the Third International Workshop on Future Multimedia Networking(FMN). Followingprevioussuccessfulworkshops (held in Cardi?, Wales in …
The papers contained in this volume were presented at the 12th edition of the International Symposium on String Processing and Information Retrieval (SPIRE), held November 2-4, …
T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, …
This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 …
Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that …
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during …
The Fourth International Working Conference on Statistical and Scientific Data Base Management (IV SSDBM) held on June 21-23, 1988 in Rome, Italy, continued the series of …
Thisvolumeprovidesacomprehensive,state-of-the-artsurveyofconceptual- deling. It includes invited papers, research papers, and abstracts of industrial …
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May …
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised …