Skip to main content
Book cover

Computational Intelligence and Security

International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

  • Conference proceedings
  • © 2005

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3802)

Part of the book sub series: Lecture Notes in Artificial Intelligence (LNAI)

Included in the following conference series:

Conference proceedings info: CIS 2005.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (172 papers)

  1. Cryptography and Coding

  2. Cryptographic Protocols

Other volumes

  1. Computational Intelligence and Security

  2. Computational Intelligence and Security

Keywords

Editors and Affiliations

  • Microelectronic Instiute, Xidian University, Xi’an, China

    Yue Hao

  • Department of Computer Science, Hong Kong Baptist University, Kowloon Tong, Hong Kong

    Jiming Liu

  • School of Computer Science and Technology, Xidian University, Xi’an, China

    Yu-Ping Wang

  • Department of Computer Science, Hong Kong Baptist University, Hong Kong,  

    Yiu-ming Cheung

  • School of Electrical and Electronic Engineering, University of Manchester, UK

    Hujun Yin

  • Life Science Research Center, School of Electronic Engineering, Xidian University, Xi’an, China

    Licheng Jiao

  • Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, Xi’an, China

    Jianfeng Ma

  • National Laboratory of Antennas and Microwave Technology, Xidian University, Xi’an, P.R. China

    Yong-Chang Jiao

Bibliographic Information

Publish with us