This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were ca...
详细信息
ISBN:
(数字)9783319272399
ISBN:
(纸本)9783319272382
This book constitutes the proceedings of the 15th IMA International
Conference on Cryptography and coding, IMACC 2015, held at Oxford, UK,
in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and
selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, informationtheory, and leakage resilience.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, US...
详细信息
ISBN:
(数字)9783031385544
ISBN:
(纸本)9783031385537
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.;Part I: Consensus, secret sharing, and multi-party computation;
Facilitate coding in generating geometric motives with a special focus on analyzing their geometric formulations. This book aims to teach analytical coding skills by combining arts and mathematics.;Geometric patt...
详细信息
ISBN:
(数字)9781484293898
ISBN:
(纸本)9781484293881
Facilitate coding in generating geometric motives with a special focus on analyzing their geometric formulations. This book aims to teach analytical coding skills by combining arts and mathematics.;Geometric patterns are quintessentially important for understanding today’s media arts and their relationship with mathematics. With the main emphasis on this, author Selçuk Artut proposes a certain workflow to mathematically analyze a geometric pattern and use creative coding skills to render it on a computer screen.;When done, you'll understand the basics of coding and expand the provided structure to cover issues of creative coding in particular. This book will also present a workflow to geometrically analyze and build patterns with detailed examples.;Any person who has an interest in using coding as a creative tool. University students from Arts, Design, Architecture, and Computer Science departments. Artists and designers who are eager to implement creative coding in their artistic production.
This book constitutes the thoroughly referred post-proceedings of the 21st International Workshop on Combinatorial Algorithms, IWOCA 2010, held in London, UK, in July 2010.;The 31 revised full papers presented togethe...
详细信息
ISBN:
(数字)9783642192227
ISBN:
(纸本)9783642192210
This book constitutes the thoroughly referred post-proceedings of the 21st International Workshop on Combinatorial Algorithms, IWOCA 2010, held in London, UK, in July 2010.;The 31 revised full papers presented together with extended abstracts of 8 poster presentations were carefully reviewed and selected from a total of 85 submissions. A broad variety of combinatorial graph algorithms for the computations of various graph features are presented; also algorithms for network compuation, approximation, computational geometry, games, and search are presented and complexity aspects of such algorithms are discussed.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in Augu...
详细信息
ISBN:
(数字)9783319637150
ISBN:
(纸本)9783319637143
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.;The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25–27, 2022.;The 17 full papers included in this book were carefully reviewed...
详细信息
ISBN:
(数字)9783031294198
ISBN:
(纸本)9783031294181
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25–27, 2022.;The 17 full papers included in this book were carefully reviewed and selected from 43 submissions. Moreover, 4 additional invited papers have been also considered. They were organized in topical sections as follows: Spectrum Management and Channel Prediction, Resource Allocation in 5G/6G, Internet of Things and Vehicular Communications, Artificial Intelligence-Driven Communications, Pervasive Services and Cyber Security.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in Augu...
详细信息
ISBN:
(数字)9783319636979
ISBN:
(纸本)9783319636962
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.;The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of information, HIMI 2021, which was held as part of HCI International 2021 and took pla...
详细信息
ISBN:
(数字)9783030783617
ISBN:
(纸本)9783030783600
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of information, HIMI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.;Part I: information presentation; visualization and decision making support; information in VR and multimodal user interfaces;
暂无评论