×

zbMATH — the first resource for mathematics

Found 168 Documents (Results 1–100)

100
MathJax
Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 145-174 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 3-31 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 177-191 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Fan, Junfeng (ed.) et al., Constructive side-channel analysis and secure design. 9th international workshop, COSADE 2018, Singapore, April 23–24, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10815, 153-167 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 214-228 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 191-213 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 24-44 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Blömer, Johannes (ed.) et al., Mathematical aspects of computer and information sciences. 7th international conference, MACIS 2017, Vienna, Austria, November 15–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10693, 438-453 (2017).
MSC:  68-XX
PDF BibTeX XML Cite
Full Text: DOI
Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 329-348 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 285-304 (2017).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 302-324 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 161-177 (2017).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 37-47 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Foresti, Sara (ed.) et al., Cryptology and network security. 15th international conference, CANS 2016, Milan, Italy, November 14–16, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-48964-3/pbk; 978-3-319-48965-0/ebook). Lecture Notes in Computer Science 10052, 319-334 (2016).
MSC:  68P25 94A62
PDF BibTeX XML Cite
Full Text: DOI
Foresti, Sara (ed.) et al., Cryptology and network security. 15th international conference, CANS 2016, Milan, Italy, November 14–16, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-48964-3/pbk; 978-3-319-48965-0/ebook). Lecture Notes in Computer Science 10052, 36-52 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chen, Lidong (ed.) et al., Security standardisation research. Third international conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49099-1/pbk; 978-3-319-49100-4/ebook). Lecture Notes in Computer Science 10074, 62-91 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 63-77 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 277-295 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 257-276 (2016).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI
Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 478-498 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 622-643 (2016).
MSC:  94A60 68P25 68M10
PDF BibTeX XML Cite
Full Text: DOI
Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 493-509 (2016).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 3-34 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 94-111 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 390-410 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 350-369 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 155-173 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 179-202 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 165-182 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 85-105 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 37-55 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
MSC:  94A60 90C11 90C05
PDF BibTeX XML Cite
Full Text: DOI
Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 341-362 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 235-247 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 149-165 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 322-335 (2012).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 46-62 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 14-23 (2011).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 11-26 (2010).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI
Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 164-181 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI
Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 310-325 (2009).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI
Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 109-125 (2008).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Year of Publication
all top 3
Classification
all top 3
Software