This book cover theory, practice, applications, and experiences related to secure software.
Continue reading
This book cover theory, practice, applications, and experiences related to secure software.
Continue reading
Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Continue reading
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue reading
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
Continue reading
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue reading