This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
In today’s world, data must be sent around the world cheaply and securely, and that requires orig...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
Hackers have uncovered the dark side of cryptography that device developed to defeat Trojan horse...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th Internationa...
The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Ital...
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on&n...
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cry...
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology ...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Intern...
This book constitutes the proceedings of the 10th International Conference on Network and System ...
This book constitutes the refereed post-conference proceedings of the Second International Confer...