Search results
Lecture Notes in Computer Science > Networking 2004 > Multicast II > 807-816
Lecture Notes in Computer Science > SOFSEM 2006: Theory and Practice of Computer Science > Regular Papers > 548-555
Lecture Notes in Computer Science > Advanced Concepts for Intelligent Vision Systems > Image and Video Coding > 38-44
Lecture Notes in Computer Science > Security in Communication Networks > Information Theory and Secret Sharing > 354-363
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Implementation Aspects > 148-162
Lecture Notes in Computer Science > Computer and Information Sciences – ISCIS 2006 > Security and Cryptography > 1011-1020
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 199-210
Lecture Notes in Computer Science > Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation > Session 9: Security and Safety > 481-490
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > Parallel Algorithms > 428-438
Lecture Notes in Computer Science > Adaptive and Natural Computing Algorithms > Systems Theory > 285-294
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 955-964
Lecture Notes in Computer Science > Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications > Image Coding, Processing and Analysis > 85-94
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Hardware Architectures > 204-215