Sökt på: Sökresultat
totalt 7 träffar
Information Hiding
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. …
Financial Cryptography and Data Security
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at …
Research in Cryptology
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised …
Towards Hardware-Intrinsic Security
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from …
Trust and Trustworthy Computing
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June …
Cryptology and Network Security
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The …
Trust and Trustworthy Computing
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 …