This book cover theory, practice, applications, and experiences related to secure software.
WeiterlesenThis book cover theory, practice, applications, and experiences related to secure software.
WeiterlesenPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
WeiterlesenThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
WeiterlesenThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
WeiterlesenThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Weiterlesen