Coding and Information Theory.
Overview
Works: | 171 works in 171 publications in 171 languages |
---|
Titles
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Fast Software Encryption = 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(Electronic resources)
VLSI-SoC: Forward-Looking Trends in IC and Systems Design = 18th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2010, Madrid, Spain, September 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Cryptography and Coding : = 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(Electronic resources)
AccessNets = Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers /
by:
(Electronic resources)
Approximation, randomization, and combinatorial optimization = algorithms and techniques : 12th International Workshop, APPROX 2009, and 13th International Workshop, RANDOM 2009, Berkeley, CA, USA, August 21-23, 2009 : proceedings /
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes = 18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection IV = Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Trustworthy global computing = 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011 : revised selected papers /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2004 = Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems = CHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
Coding and cryptology = third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography = 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2009 = 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Provable security = third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Information and communications security = 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Coding Theory and Applications = Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings /
by:
(Electronic resources)
Theory of quantum computation, communication, and cryptography = 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, revised selected papers /
by:
(Electronic resources)
Developments in language theory = 16th International Conference, DLT 2012, Taipei, Taiwan, August 14-17, 2012 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Electronic resources)
Information security theory and practice = smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
Provable security = second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings /
by:
(Electronic resources)
Number theory in science and communication = with applications in cryptography, physics, digital information, computing, and self-similarity /
by:
(Electronic resources)
Towards an information theory of complex networks = statistical methods and applications /
by:
(Electronic resources)
Theory of cryptography = 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
Principles, systems and applications of IP telecommunications = services and security for next generation networks : second international conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers /
by:
(Electronic resources)
Distributed multiple description coding = principles, algorithms and systems /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2008 = 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings /
by:
(Electronic resources)
Foundations and applications of security analysis = Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers /
by:
(Electronic resources)
Digital watermarking = 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(Electronic resources)
Independent component analysis and signal separation = 8th International Conference, ICA 2009, Paraty, Brazil, March 15 - 18, 2009 proceedings /
by:
(Electronic resources)
e-Business and telecommunications = 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Electronic resources)
Information security and privacy = 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
(Electronic resources)
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Electronic resources)
Computer science logic = 23rd international workshop, CSL 2009, 18th annual conference of the EACSL, Coimbra, Portugal, September 7-11, 2009 : proceedings /
by:
(Electronic resources)
Information security and privacy = 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings /
by:
(Electronic resources)
Symbolic and Quantitative Approaches to Reasoning with Uncertainty = 10th European Conference, ECSQARU 2009, Verona, Italy, July 1-3, 2009. Proceedings /
by:
(Electronic resources)
Procedural semantics for hyperintensional logic = foundations and applications of transparent intensional logic /
by:
(Electronic resources)
e-Business and telecommunications = 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2009 = 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2010 = 4th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2010 = 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Combinatorial algorithms = 20th International Workshop, IWOCA 2009, Hradec nad Moravici, Czech Republic, June 28 - July 2, 2009 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2012 = 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 : proceedings /
by:
(Electronic resources)
Digital watermarking = 6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Electronic resources)
E-business and telecommunications = international conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
Information and communications security = 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Arithmetic of Finite Fields = 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(Electronic resources)
Information security technology for applications = 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Identity and privacy in the internet age = 14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings /
by:
(Electronic resources)
Information security and cryptology = 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers /
by:
(Electronic resources)
Combinatorial optimization and applications = third international conference, COCOA 2009, Huangshan, China, June 10-12, 2009 : proceedings /
by:
(Electronic resources)
Fast Software Encryption = 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(Electronic resources)
Computer science - theory and applications = 4th International Computer Science Symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18-23, 2009 : Proceedings /
by:
(Electronic resources)
Information Security and Privacy = 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
by:
(Electronic resources)
Information security technology for applications = 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Trust Management III = Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings /
by:
(Electronic resources)
Trustworthly global computing = 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Electronic resources)
Mathematical methods in computer science = essays in memory of Thomas Beth /
by:
(Electronic resources)
Information theoretic security = 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2009 = 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 : Proceedings /
by:
(Electronic resources)
Information and communications security = 13th international conference, ICICS 2011, Beijing, China, November 23-26, 2011 : proceedings /
by:
(Electronic resources)
Information security and assurance = international conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(Electronic resources)
Sequences and their applications - SETA 2012 = 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012 : proceedings /
by:
(Electronic resources)
Sequences and their applications - SETA 2010 = 6th International Conference, Paris, France, September 13-17, 2010, proceedings /
by:
(Electronic resources)
Formal to practical security = papers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Electronic resources)
Digital watermarking = 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(Electronic resources)
Selected Areas in Cryptography = 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
by:
(Electronic resources)
Information hiding = 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(Electronic resources)
VLSI-SoC = technologies for systems integration : 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2009, Florianopolis, Brazil, October 12-14, 2009, revised selected papers /
by:
(Electronic resources)
Formal theories of information = from Shannon to semantic information theory and general concepts of information /
by:
(Electronic resources)
Security in emerging wireless communication and networking systems = First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems -- CHES 2008 = 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Advances in Information Systems Research, Education and Practice = IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy /
by:
(Electronic resources)
Security Technology = International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Computer Safety, Reliability, and Security : = 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings
by:
(Electronic resources)
Theory of quantum computation, communication and cryptography = 5th conference, TQC 2010, Leeds, UK, April 13-15, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in security technology = International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Advances in information security and assurance = third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Electronic resources)
Cooperative communications and networking = technologies and system design /
by:
(Electronic resources)
Applied cryptography and network security = 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012 : proceedings /
by:
(Electronic resources)
Cryptography and coding = 13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(Electronic resources)
Principles of compilers = a new approach to compilers including the algebraic method /
by:
(Electronic resources)
Digital watermarking = 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2009 = 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 : proceedings /
by:
(Electronic resources)
Coding and cryptology = second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(Electronic resources)
Transactions on data hiding and multimedia security VIII = special issue on pattern recognition for IT security /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2012 = 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012 : proceedings /
by:
(Electronic resources)
Universal Artificial Intellegence = Sequential Decisions Based on Algorithmic Probability /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Theory of quantum computation, communication, and cryptography = third workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008 : revised selected papers /
by:
(Electronic resources)
Transactions on computational science XI = special issue on security in computing, part II /
by:
(Electronic resources)
Cryptography and coding = 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings /
by:
(Electronic resources)
Critical Infrastructure Protection III = third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009 : revised selected papers /
by:
(Electronic resources)
Information and communications security = 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
Cryptology and Network Security = 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Advances in information security and its application = third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Thinkquest~2010 = international conference on Contours of Computing Technology on 13th and 14th March, 2010 /
by:
(Electronic resources)
Dependable Computing : = Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005, Proceedings
by:
(Electronic resources)
Quantum information, computation and cryptography = an introductory survey of theory, technology and experiments /
by:
(Electronic resources)
VLSI-SoC = Design Methodologies for SoC and SiP : 16th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2008, Rhodes Island, Greece, October 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Provable security = 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Combinatorial algorithms = 21st international workshop, IWOCA 2010, London, UK, July 26-28, 2010 : revised selected papers /
by:
(Electronic resources)
Show more
Fewer
Subjects