This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Lee masThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lee masDesign and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
Lee masSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Lee masThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lee masThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lee masThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lee masThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Lee masThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Lee masThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...
Lee mas