This book cover theory, practice, applications, and experiences related to secure software.
Continue readingThis book cover theory, practice, applications, and experiences related to secure software.
Continue readingPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
Continue readingThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue reading