This book cover theory, practice, applications, and experiences related to secure software.
اقرأ المزيد
This book cover theory, practice, applications, and experiences related to secure software.
اقرأ المزيد
Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
اقرأ المزيد
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
اقرأ المزيد
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيد