The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue reading