Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

نویسندگان

  • Jooyoung Lee
  • Jongsung Kim
  • Atsushi Takayasu
  • Wenbin Zhang
  • Fuyuki Kitagawa
  • Takahiro Matsuda
  • Goichiro Hanaoka
  • Guizhen Zhu
  • Zhongxiang Zheng
  • Yosuke Todo
  • Andrey Bogdanov
  • Donghoon Chang
  • Mohona Ghosh
  • Rong Wang
  • Ariano-Tim Donda
  • Peter Samarin
  • Jacek Samotyja
  • Kerstin Lemke-Rust
  • Xueqiang Wang
  • Yuewu Wang
  • Jiwu Jing
  • Jiageng Chen
  • Atsuko Miyaji
  • Dong-Chan Kim
  • Deukjo Hong
  • Cheonshik Kim
  • Jinsuk Baek
  • Jongseok Choi
  • Ratna Dutta
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading information security applications 5th international workshop wisa 2004 jeju island korea august 23 25 2004 revised selected pape...

متن کامل

Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

Excellent book is always being the best friend for spending little time in your office, night time, bus, and everywhere. It will be a good way to just look, open, and read the book while in that time. As known, experience and skill don't always come with the much money to acquire them. Reading this book with the PDF information security applications 10th international workshop wisa 2009 busan k...

متن کامل

Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

Why should wait for some days to get or receive the progress in cryptology indocrypt 2006 7th international conference on cryptology in india kolkata india december 11 13 2006 proceedings computer science security and cryptology book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receiv...

متن کامل

Advanced theory and practice for high performance computing and communications

This collection of papers is selected from those presented at from selected best papers at the International Conference on High Performance Computing and Communications HPCC-09 [1] and the International Conference on Information Security and Assurance ISA-09 [2] conferences, Seoul, Korea, June 25-27, 2009. The papers [3,4,5,6,7,8,9] were all enhanced over the conference versions and separately ...

متن کامل

Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

A solution to get the problem off, have you found it? Really? What kind of solution do you resolve the problem? From what sources? Well, there are so many questions that we utter every day. No matter how you will get the solution, it will mean better. You can take the reference from some books. And the information hiding 7th international workshop ih 2005 barcelona spain june 6 8 2005 revised s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 3506  شماره 

صفحات  -

تاریخ انتشار 2005