This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic ...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th Internatio...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th Internatio...
This book constitutes the refereed proceedings of the 18th International Conference on the Theory...
Thisbook constitutes the refereed proceedings of the Cryptographer's Track at theRSA Conference 2...
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial ...
This book constitutes the thoroughly refereed post-conferenceproceedings of the 22nd Internatio...
Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Funda...
Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Funda...
Machine Learning.- Privacy-Enhanced Machine Learning with Functional Encryption.- Towards Secure ...
Software Security.- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs....
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Confe...