This book cover theory, practice, applications, and experiences related to secure software.
اقرأ المزيدThis book cover theory, practice, applications, and experiences related to secure software.
اقرأ المزيدPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
اقرأ المزيدThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
اقرأ المزيدThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيد