Conference on Security

Results: 2278



#Item
121

The 5nd International Conference on Cryptology and Network Security (CANS~10 Dec 2006, Suzhou, P.R.China http://www.bg-hotel.com/eindex.htm

Add to Reading List

Source URL: cis.sjtu.edu.cn

Language: English - Date: 2007-12-24 08:58:28
    122

    ICISC 2011 Call for papers The 14th Annual International Conference on Information Security and Cryptology November 30 ~ December 2, 2011, Seoul, Korea http://www.icisc.org/ Original research papers on all aspects of the

    Add to Reading List

    Source URL: www.icisc.org

    Language: English - Date: 2016-01-16 13:27:12
      123

      6th EMBO/EMBL joint conference on Science and Society “Science and Security” 28-29 October 2005 EMBL Operon, Meyerhofstr. 1, 69117 Heidelberg, Germany

      Add to Reading List

      Source URL: events.embo.org

      Language: English - Date: 2013-01-28 05:45:08
        124

        This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

        Add to Reading List

        Source URL: www.uncg.edu

        Language: English - Date: 2009-10-01 23:36:57
          125

          2014 Twelfth Annual Conference on Privacy, Security and Trust (PST) Another Free App: Does It Have the Right Intentions? Mohamed Fazeen

          Add to Reading List

          Source URL: nsl.cse.unt.edu

          Language: English - Date: 2014-10-22 22:57:30
            126

            2015 Conference on Decision and Game Theory for Security (GameSec), London, UK Nations, corporations, and individuals constantly need to reason about how to protect their sensitive assets in order to ensure economic grow

            Add to Reading List

            Source URL: www.gamesec-conf.org

            Language: English - Date: 2015-05-31 06:22:57
              127

              Special Session on Machine Learning in Information and System Security Issues Of The Twelveth International Conference on Machine Learning and Applications (ICMLA 13) http://www.icmla-conference.org/icmla13/

              Add to Reading List

              Source URL: icmla-conference.org

              Language: English - Date: 2013-09-18 12:37:01
                128Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

                - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

                Add to Reading List

                Source URL: security-lab.jaist.ac.jp

                Language: English - Date: 2015-11-09 21:16:55
                129

                The Second International Conference on Emerging Security Information, Systems and Technologies A BODY-CENTERED CUBIC METHOD FOR KEY AGREEMENT IN DYNAMIC MOBILE AD HOC NETWORKS Ioannis G. Askoxylakis Foundation for Resea

                Add to Reading List

                Source URL: damien.sauveron.fr

                Language: English - Date: 2013-02-26 15:54:32
                  130

                  The 21st Annual International Conference on the Theory and Application of Cryptology and Information Security, will be held at the University of Auckland in New Zealand on November 29 to December 3, 2015. Early registrat

                  Add to Reading List

                  Source URL: www.math.auckland.ac.nz

                  - Date: 2015-11-25 21:41:16
                    UPDATE