HOTP-Based User Authentication Scheme in Home NetworksAdvances in Cryptology — CRYPTO ’90Advances in Cryptology — CRYPTO ’87Advances in Cryptology — CRYPTO ’86Advances in Cryptology — CRYPTO ’91Post-Quantum Cryptography — PQCrypto 2010Advances in Cryptology — ASIACRYPT 1998Advances in Cryptology — CRYPTO’94PQCrypto 2014Fast Software Encryption — FSE 2000Advances in Cryptology — CRYPTO ’88Fast Software Encryption — FSE '93Fast Software Encryption — FSE '96Advances in Cryptology — AUSCRYPT '92Verified Software: Theories, Tools, ExperimentsA hybrid neuro-fuzzy approach for spinal force evaluation in manual materials handling tasksFacial shape variation of U.S. respirator usersCharacterising Citations in Scholarly Documents: The CiTalO FrameworkMerkle Signatures with Virtually Unlimited Signature CapacityCoDi-1Bit : A simplified cellular automata based neuron modelThe Semantic Web: ESWC 2012 Satellite EventsMultiMedia ModelingBuilding and Testing a Statistical Shape Model of the Human Ear CanalConvolutional LSTM Networks for Subcellular Localization of ProteinsOn bayesian methods for seeking the extremumThe Semantic Web - ISWC 2016: 15th International Semantic Web Conference, Kobe, Japan, October 17–21, 2016, Proceedings, Part IILacking Labels in the Stream: Classifying Evolving Stream Data with Few LabelsThe Semantic Web - ISWC 2006Digital Libraries: Knowledge, Information, and Data in an Open Access SocietyHuman Language Technology. Challenges of the Information SocietyBreaking reCAPTCHAs with Unpredictable Collapse: Heuristic Character Segmentation and RecognitionA New Dedicated 256-Bit Hash Function: FORK-256Stop Minding Your P’s and Q’s: Implementing a Fast and Simple DFS-Based Planarity Testing and Embedding AlgorithmExtending FORK-256 Attack to the Full Hash FunctionTesting Planarity by Switching TrainsAutomated Testing and Debugging of SAT and QBF SolversCombining HCI, Natural Language Processing, and Knowledge Discovery - Potential of IBM Content Analytics as an Assistive Technology in the Biomedical FieldScalability Evaluation of Barrier Algorithms for OpenMPIntegrating Software Construction and Software DeploymentDomino Tatami Covering Is NP-Complete
P1433
Advances in Cryptology — EUROCRYPT 2004Advances in Cryptology — EUROCRYPT ’93Advances in Cryptology — EUROCRYPT 2007Advances in Cryptology — EUROCRYPT '94Advances in Cryptology — EUROCRYPT ’91Advances in Cryptology — EUROCRYPT 2005Advances in Cryptology — EUROCRYPT 2010Advances in Cryptology — EUROCRYPT ’84The Semantic Web – ISWC 2014, Part IThe Semantic Web: ESWC 2012 Satellite EventsMachine learning and interpretation in neuroimaging : international workshop, MLINI 2011, held at NIPS 2011, Sierra Nevada, Spain, December 16-17, 2011 : revised selected and invited contributions. MLINI 2011 (2011 : Granada, Spain)Advances in Cryptology — EUROCRYPT 2013Advances in Cryptology — CRYPTO’ 99Advances in Cryptology — EUROCRYPT ’99Knowledge Engineering and Knowledge Management: 20th International Conference, EKAW 2016, Bologna, Italy, November 19-23, 2016, ProceedingsAdvances in Cryptology — EUROCRYPT '87The Semantic Web – ISWC 2013: 12th International Semantic Web Conference, Sydney, NSW, Australia, October 21-25, 2013, Proceedings, Part IIAdvances in Cryptology — EUROCRYPT '92Advances in Cryptology — EUROCRYPT ’88Advances in Cryptology — EUROCRYPT 2011Advances in Cryptology — EUROCRYPT 2012Advances in Cryptology — CRYPTO 2011Public-Key Cryptography — PKC 2014Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part IMultiMedia ModelingThe Semantic Web: 6th International Semantic Web Conference, 2nd Asian Semantic Web Conference, ISWC 2007 + ASWC 2007, Busan, Korea, November 11-15, 2007. ProceedingsThe Semantic Web - ISWC 2016: 15th International Semantic Web Conference, Kobe, Japan, October 17–21, 2016, Proceedings, Part IIThe Semantic Web - ISWC 2006Digital Libraries: Knowledge, Information, and Data in an Open Access SocietyHuman Language Technology. Challenges of the Information SocietyAlgorithmic Number Theory: 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, ProceedingsProgramming Languages and Their Definition: Selected PapersAlgorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006. ProceedingsThe Semantic Web: Research and ApplicationsThe Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28 – June 1, 2017, Proceedings, Part IThe Semantic Web: Research and Applications. 9th Extended Semantic Web Conference, ESWC 2012, Heraklion, Crete, Greece, May 27-31, 2012. ProceedingsAdvances in Cryptology - CRYPTO '92Medical Image Computing and Computer-Assisted Intervention – MICCAI 2005, 8th International Conference, Palm Springs, CA, USA, October 26-29, 2005, Proceedings, Part IIMachine Learning and Data Mining in Pattern Recognition: 13th International Conference, MLDM 2017, New York, NY, USA, July 15-20, 2017, ProceedingsHuman Aspects of Information Security, Privacy and Trust
P179
Selected Areas in Cryptography — SAC 2001Advances in Information Security and AssuranceAdvances in Cryptology — CRYPTO ’89Advances in Cryptology — CRYPTO ’90Advances in Cryptology — CRYPTO ’87Advances in Cryptology — CRYPTO ’86Advances in Cryptology — CRYPTO ’91Advances in Cryptology — CRYPTO ’98Advances in Cryptology — ASIACRYPT 2001Post-Quantum Cryptography — PQCrypto 2010Advances in Cryptology — ASIACRYPT 1998Advances in Cryptology — CRYPTO’94PQCrypto 2014Fast Software Encryption — FSE 2000Advances in Cryptology — CRYPTO ’88Fast Software Encryption — FSE '93Fast Software Encryption — FSE '96Advances in Cryptology — AUSCRYPT '92Verified Software: Theories, Tools, ExperimentsAdvances in Cryptology — CRYPTO ’84Selected Areas in Cryptography — SAC 2003CryptographyFast Software Encryption — FSE '99Fast Software Encryption — FSE '98Selected Areas in Cryptography — SAC '99Fast Software Encryption — FSE '97Advances in Cryptology — CRYPTO 2004Advances in Cryptology — CRYPTO 2005Progress in Cryptology — INDOCRYPT 2004Progress in Cryptology — AFRICACRYPT 2010Selected Areas in Cryptography — SAC 2010Fast Software Encryption — FSE 2007Cryptographic Hardware and Embedded Systems — CHES 2011Digital Watermarking — IWDW 2008Advances in Cryptology — ASIACRYPT 2004Fast Software Encryption — FSE 2005Advances in Cryptology — ASIACRYPT 2010Public Key Cryptography — PKC 2010Public Key Cryptography — PKC 2008Post-Quantum Cryptography — PQCrypto 2008
P361
description
Buchreihe aus der Informatik
@de
boekenreeks
@nl
bogserie
@da
book series by Springer publishing
@en
name
Lecture Notes in Computer Science
@da
Lecture Notes in Computer Science
@de
Lecture Notes in Computer Science
@en
Lecture Notes in Computer Science
@es
Lecture Notes in Computer Science
@fi
Lecture Notes in Computer Science
@fo
Lecture Notes in Computer Science
@fr
Lecture Notes in Computer Science
@is
Lecture Notes in Computer Science
@it
Lecture Notes in Computer Science
@kl
type
label
Lecture Notes in Computer Science
@da
Lecture Notes in Computer Science
@de
Lecture Notes in Computer Science
@en
Lecture Notes in Computer Science
@es
Lecture Notes in Computer Science
@fi
Lecture Notes in Computer Science
@fo
Lecture Notes in Computer Science
@fr
Lecture Notes in Computer Science
@is
Lecture Notes in Computer Science
@it
Lecture Notes in Computer Science
@kl
altLabel
LNCS
@de
LNCS
@en
Lecture notes in computer science
@en
prefLabel
Lecture Notes in Computer Science
@da
Lecture Notes in Computer Science
@de
Lecture Notes in Computer Science
@en
Lecture Notes in Computer Science
@es
Lecture Notes in Computer Science
@fi
Lecture Notes in Computer Science
@fo
Lecture Notes in Computer Science
@fr
Lecture Notes in Computer Science
@is
Lecture Notes in Computer Science
@it
Lecture Notes in Computer Science
@kl
P1058
P1156
P1277
P1476
Lecture Notes in Computer Science
@en
P1813
LNCS
@en
P236
P31
P407
P571
1973-01-01T00:00:00Z