Search

Your search keyword '"Lecture Notes in Computer Science"' showing total 1,620 results

Search Constraints

Start Over You searched for: Descriptor "Lecture Notes in Computer Science" Remove constraint Descriptor: "Lecture Notes in Computer Science"
1,620 results on '"Lecture Notes in Computer Science"'

Search Results

1. South African research contributions to Lecture Notes in Computer Science, 1973-2022.

2. South African research contributions to Lecture Notes in Computer Science, 1973–2022

8. Machine Learning Meets Data Modification: The Potential of Pre-processing for Privacy Enchancement

10. Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings

13. Machine Learning Meets Data Modification

14. Machine Learning Meets Data Modification: The Potential of Pre-processing for Privacy Enchancement

22. Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings

24. KangarooTwelve: Fast Hashing Based on KECCAK-p

27. A Virtual Class Room for Cybersecurity Education

28. Benchmarks for Automata Learning and Conformance Testing

31. A Virtual Class Room for Cybersecurity Education

32. Combining Black-Box and White-Box Techniques for Learning Register Automata

33. Benchmarks for Automata Learning and Conformance Testing

34. Mitigating Multi-target Attacks in Hash-Based Signatures

37. KangarooTwelve: Fast Hashing Based on KECCAK-p

40. Vectorizing higher-order masking

41. On the Move to Meaningful Internet Systems. OTM 2018 Conferences - Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part II

42. Vectorizing higher-order masking

44. Computing Response Time Distributions Using Iterative Probabilistic Model Checking

45. On Linkability and Malleability in Self-blindable Credentials

46. The Degrees of Squares is an Atom

47. Logical Attacks on Secured Containers of the Java Card Platform

48. Gimli: a cross-platform permutation

50. iDSL: Automated Performance Evaluation of Service-Oriented Systems

Catalog

Books, media, physical & digital resources