Computational Intelligence and Security International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II / [electronic resource] : edited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao. - 1st ed. 2005. - XLII, 1166 p. online resource. - Lecture Notes in Artificial Intelligence, 3802 2945-9141 ; . - Lecture Notes in Artificial Intelligence, 3802 .

Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.

9783540315988

10.1007/11596981 doi


Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Information storage and retrieval systems.
Application software.
Computer science.
Algorithms.
Cryptology.
Artificial Intelligence.
Information Storage and Retrieval.
Computer and Information Systems Applications.
Theory of Computation.
Algorithms.

QA268

005.824