Search

Your search keyword '"Electronic data processing—Management"' showing total 250 results

Search Constraints

Start Over You searched for: Descriptor "Electronic data processing—Management" Remove constraint Descriptor: "Electronic data processing—Management" Topic algorithms Remove constraint Topic: algorithms
250 results on '"Electronic data processing—Management"'

Search Results

1. Computer Algebra in Scientific Computing : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings

2. Theory and Practice of Natural Computing : 8th International Conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019, Proceedings

3. Smart Card Research and Advanced Applications : 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers

4. Topics in Cryptology – CT-RSA 2017 : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings

5. Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings

6. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II

7. Decision and Game Theory for Security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

8. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I

9. Enterprise Security : Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers

10. Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II

11. Computer Security – ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I

12. Computer Security – ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II

13. Computer Algebra in Scientific Computing : 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedings

14. Progress in Cryptology – INDOCRYPT 2017 : 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings

15. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

16. Simulation and Synthesis in Medical Imaging : Second International Workshop, SASHIMI 2017, Held in Conjunction with MICCAI 2017, Québec City, QC, Canada, September 10, 2017, Proceedings

17. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings

18. Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I

19. Wireless Algorithms, Systems, and Applications : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings

20. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

21. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I

22. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I

23. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III

24. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II

25. Advances in Cryptology – EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

26. Advances in Cryptology – EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I

27. Principles of Security and Trust : 5th International Conference, POST 2016, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings

28. Public-Key Cryptography – PKC 2016 : 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II

29. Public-Key Cryptography – PKC 2016 : 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I

30. Energy Informatics : 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedings

31. Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings

32. Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

33. Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

34. The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

35. Data Privacy Management and Security Assurance : 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

36. Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

37. Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

38. Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings

39. Decision and Game Theory for Security : 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings

40. Multiple Access Communications : 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings

41. Progress in Cryptology – INDOCRYPT 2016 : 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings

42. Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings

43. Stabilization, Safety, and Security of Distributed Systems : 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings

44. Security Standardisation Research : Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings

45. Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings

46. Smart Card Research and Advanced Applications : 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers

47. Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers

48. Advances in Network Science : 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings

49. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I

50. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II

Catalog

Books, media, physical & digital resources