STACS 98


Book Description

This book constitutes the strictly refereed proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, STACS 98, held in Paris, France, in February 1998. The volume presents three invited surveys together with 52 revised full papers selected from a total of 155 submissions. The papers are organized in topical sections on algorithms and data structures, logic, complexity, and automata and formal languages.




Stacs 98


Book Description




STACS 99


Book Description

This book constitutes the refereed proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, STACS 99, held in Trier, Germany in March 1999. The 51 revised full papers presented were selected from a total of 146 submissions. Also included are three invited papers. The volume is divided in topical sections on complexity, parallel algorithms, computational geometry, algorithms and data structures, automata and formal languages, verification, algorithmic learning, and logic in computer science.




Mathematical Foundations of Computer Science 1998


Book Description

This book constitutes the refereed proceedings of the 23rd International Symposium on the Mathematical Foundations of Computer Science, MFCS'98, held in Brno, Czech Republic, in August 1998. The 71 revised full papers presented were carefully reviewed and selected from a total of 168 submissions. Also included are 11 full invited surveys by prominent leaders in the area. The papers are organized in topical sections on problem complexity; logic, semantics, and automata; rewriting; automata and transducers; typing; concurrency, semantics, and logic; circuit complexity; programming; structural complexity; formal languages; graphs; Turing complexity and logic; binary decision diagrams, etc..




EP '98


Book Description

This book presents the refereed proceedings of the EP'98 and RIDT'98 conferences, held jointly during the Second International Week on Electronic Publishing and Typography in St. Malo, France, in March/April 1998. The 43 revised full papers presented were carefully selected for inclusion in the book. Among the topics covered are artistic imaging, tools and methods in typography, non-latin type, typographic creation, imaging, character recognition, handwriting models, legibility and design issues, fonts and design, time and multimedia, electronic and paper documents, document engineering, documents and linguistics, document reuse, hypertext and the Web, and hypertext creation and management.




Advances in Cryptology - EUROCRYPT '98


Book Description

This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998. The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.




Mathematical Foundations of Computer Science 2004


Book Description

This volume contains the papers presented at the 29th Symposium on Mat- matical Foundations of Computer Science, MFCS 2004, held in Prague, Czech Republic, August 22–27, 2004. The conference was organized by the Institute for Theoretical Computer Science (ITI) and the Department of Theoretical Com- terScienceandMathematicalLogic(KTIML)oftheFacultyofMathematicsand Physics of Charles University in Prague. It was supported in part by the Eu- pean Association for Theoretical Computer Science (EATCS) and the European Research Consortium for Informatics and Mathematics (ERCIM). Traditionally, the MFCS symposia encourage high-quality research in all branches of theoretical computer science. Ranging in scope from automata, f- mal languages, data structures, algorithms and computational geometry to c- plexitytheory,modelsofcomputation,andapplicationsincludingcomputational biology, cryptography, security and arti?cial intelligence, the conference o?ers a unique opportunity to researchers from diverse areas to meet and present their results to a general audience. The scienti?c program of this year’s MFCS took place in the lecture halls of the recently reconstructed building of the Faculty of Mathematics and P- sics in the historical center of Prague, with the famous Prague Castle and other celebratedhistoricalmonumentsinsight.Theviewfromthewindowswasach- lengingcompetitionforthespeakersinthe?ghtfortheattentionoftheaudience. But we did not fear the result: Due to the unusually tough competition for this year’s MFCS, the admitted presentations certainly attracted considerable in- rest. The conference program (and the proceedings) consisted of 60 contributed papers selected by the Program Committee from a total of 167 submissions.




Information Security and Cryptology - ICISC'99


Book Description

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation.




Multimedia Applications, Services and Techniques - ECMAST'98


Book Description

This book constitutes the refereeed proceedings of the Third European Conference on Multimedia Applications, Services and Techniques, ECMAST '98, held in Berlin, Germany, in May 1998. The 40 revised full papers presented were carefully selected for inclusion in the book by the program committee. The topics covered include multimedia networks and protocols; coded representation of images, sound, and data; multimedia delivery on broadcast and telecom networks; servers and storage architechtures; advanced multimedia terminals and in house networks; multimedia services; Internet and multimedia scenario; and multimedia trials.




Selected Areas in Cryptography


Book Description

AC’98 A C - . AC’94 AC’96 ’ ! K AC’95 AC’97 C ! O . & . I - * . & * AC’98 : • D A ** K C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - * .& ! , A M K A * E B * I O ! J :C J -3