Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Choose an application
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- Sécurité informatique --- Congrès
Choose an application
This is the proceedings of the SIGAL International Symposium on Algorithms held at CSK Information Education Center, Tokyo, Japan, August 16-18, 1990. SIGAL (Special Interest Group on Algorithms) was organized within the Information Processing Society of Japan in 1988 to encourage research in the field of discrete algorithms, and held 6-8 research meetings each year. This symposium is the first international symposium organized by SIGAL. In response to the call for papers, 88 papers were submitted from around the world. The program committee selected 34 for presentation at the symposium. The symposium also included 5 invited lectures and 10 invited presentations. The subjects of the papers range widely in the field of discrete algorithms in theoretical computer science. Keywords for these subjects are: computational geometry, graph algorithms, complexity theory, parallel algorithms, distributed computing, and computational algebra.
681.3*G3 --- 681.3*H3 --- Algorithms --- -681.3*F1 --- 681.3*F2 --- 681.3*G2 --- Algorism --- Algebra --- Arithmetic --- Probability and statistics: probabilistic algorithms (including Monte Carlo);random number generation; statistical computing; statistical software (Mathematics of computing) --- Information storage and retrieval. Cd-rom --- Congresses --- Computation by abstract devices --- Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- Discrete mathematics (Mathematics of computing) --- Foundations --- Congresses. --- 681.3*G2 Discrete mathematics (Mathematics of computing) --- 681.3*F2 Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- 681.3*F1 Computation by abstract devices --- 681.3*H3 Information storage and retrieval. Cd-rom --- 681.3*G3 Probability and statistics: probabilistic algorithms (including Monte Carlo);random number generation; statistical computing; statistical software (Mathematics of computing) --- 681.3*F1 --- Information theory. --- Computer engineering. --- Operations research. --- Computer software. --- Computer science. --- Combinatorics. --- Theory of Computation. --- Electrical Engineering. --- Operations Research/Decision Theory. --- Algorithm Analysis and Problem Complexity. --- Computation by Abstract Devices. --- Combinatorics --- Mathematical analysis --- Informatics --- Science --- Software, Computer --- Computer systems --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Computers --- Communication theory --- Communication --- Cybernetics --- Design and construction
Choose an application
Error-correcting codes (Information theory) --- Algebra --- Algorithms --- Codes correcteurs d'erreurs (Théorie de l'information) --- Algèbre --- Algorithmes --- Congresses. --- Data processing --- Congrès --- Informatique --- Mathematics --- Physical Sciences & Mathematics --- Codes, Error-correcting (Information theory) --- Error-detecting codes (Information theory) --- Forbidden-combination check (Information theory) --- Self-checking codes (Information theory) --- Computer science. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Symbolic and Algebraic Manipulation. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Foundations --- Artificial intelligence --- Automatic control --- Coding theory --- Computational complexity. --- Computer software. --- Cryptology. --- Data processing. --- Software, Computer --- Computer systems --- Complexity, Computational --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Algebraic algorithms --- Cryptography. --- Discrete mathematics. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Computer Science --- Engineering & Applied Sciences --- Congresses --- Access control --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Operating Systems. --- Cryptography --- Computer software. --- Information Systems. --- Cryptology. --- Computer operating systems --- Disk operating systems --- Systems software --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congresses --- Access control --- Congresses. --- Congrès --- Accès --- Contrôle --- Public key cryptography --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Computer programming. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Cryptography --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Disk operating systems --- Systems software --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems --- Distributed processing --- Foundations --- Programming
Choose an application
Computer security --- Telecommunication systems --- Sécurité informatique --- Systèmes de télécommunications --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer
Choose an application
This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February 1998. The volume presents four invited contributions together with 18 revised full papers selected from 30 submissions. The papers address all current issues in research and design in the area including digital signature schemes, digital payment systems, electronic commerce, cryptographic protocols, as well as foundational issues like integer factorization, elliptic curve aspects, hash functions, finite fields, etc.
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Congresses --- Access control --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Computers. --- Algorithms. --- Computer Science. --- Data Encryption. --- Theory of Computation. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Information theory. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Distributed processing --- Foundations --- Computer security - Congresses --- Computers - Access control - Congresses --- Data encryption (Computer science) - Congresses --- Public key cryptography - Congresses
Listing 1 - 9 of 9 |
Sort by
|