Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18205 dokumen yang sesuai dengan query
cover
"This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol."
Berlin: Springer-Verlag, 2012
e20410405
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications."
Heidelberg : Springer, 2012
e20406883
eBooks  Universitas Indonesia Library
cover
"This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography."
Berlin: Springer-Verlag, 2012
e20409970
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
Heidelberg: Springer, 2012
e20408388
eBooks  Universitas Indonesia Library
cover
Pascal Bouvry, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing."
Berlin: Springer-Verlag, 2012
e20408078
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization."
Heidelberg: Springer, 2012
e20410305
eBooks  Universitas Indonesia Library
cover
Angelos D. Keromytis, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27–March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20410043
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20408684
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 13th Advances in Computer Games Conference, ACG 2011, held in Tilburg, The Netherlands, in November 2011. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics such as Monte-Carlo tree search and its enhancement, temporal difference learning, optimization, solving and searching, analysis of a game characteristic, new approaches, and serious games."
Berlin: Springer-Verlag, 2012
e20406323
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Málaga, Spain, in November 2011.
The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration."
Heidelberg: Springer, 2012
e20408155
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>