41
Information Security and Privacy [E-Book] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /
42
Information Security Applications [E-Book] : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers /
43
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems [E-Book] : 6th International Conference, CPAIOR 2009 Pittsburgh, PA, USA, May 27-31, 2009 Proceedings /
44
Large-Scale Scientific Computing [E-Book] : 6th International Conference, LSSC 2007, Sozopol, Bulgaria, June 5-9, 2007. Revised Papers /
45
Learning and Intelligent Optimization [E-Book] : Second International Conference, LION 2007 II, Trento, Italy, December 8-12, 2007. Selected Papers /
46
Logic, Language, Information and Computation [E-Book] : 16th International Workshop, WoLLIC 2009, Tokyo, Japan, June 21-24, 2009. Proceedings /
47
Methods and Models in Artificial and Natural Computation. A Homage to Professor Mira’s Scientific Legacy [E-Book] : Third International Work-Conference on the Interplay Between Natural and Artificial Computation, IWINAC 2009, Santiago de Compostela, Spain, June 22-26, 2009, Proceedings, Part I /
48
Network Control and Optimization [E-Book] : Second Euro-NF Workshop, NET-COOP 2008 Paris, France, September 8-10, 2008. Revised Selected Papers /
49
Numerical Analysis and Its Applications [E-Book] : 4th International Conference, NAA 2008, Lozenetz, Bulgaria, June 16-20, 2008. Revised Selected Papers /
50
Programming Languages and Systems [E-Book] : 18th European Symposium on Programming, ESOP 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings /
51
Progress in Cryptology – AFRICACRYPT 2009 [E-Book] : Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings /
52
Public Key Cryptography – PKC 2009 [E-Book] : 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
53
Quantum Interaction [E-Book] : Third International Symposium, QI 2009, Saarbrücken, Germany, March 25-27, 2009. Proceedings /
54
Research in Computational Molecular Biology [E-Book] : 13th Annual International Conference, RECOMB 2009, Tucson, AZ, USA, May 18-21, 2009. Proceedings /
55
Scale Space and Variational Methods in Computer Vision [E-Book] : Second International Conference, SSVM 2009, Voss, Norway, June 1-5, 2009. Proceedings /
56
Theory and Applications of Models of Computation [E-Book] : 6th Annual Conference, TAMC 2009, Changsha, China, May 18-22, 2009. Proceedings /
57
Theory of Cryptography [E-Book] : 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
58
Tools and Algorithms for the Construction and Analysis of Systems [E-Book] : 15th International Conference, TACAS 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings /
59
Topics in Cryptology – CT-RSA 2009 [E-Book] : The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings /
60
Transactions on Computational Science IV [E-Book] : Special Issue on Security in Computing /