This book constitutes the proceedings of the 17th International Conference on the Theory and Appl...
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology...
In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more...
This book constitutes the refereed proceedings of the 10th International Conference on Practice a...
This book constitutes the refereed proceedings of the 18th International Conference on the Theory...
This book takes China Mobile's "e;5G +"e; plan as the mainline, introduces three major sc...
This book constitutes the refereed proceedings of the 10th International Conference on Practic...
This book constitutes the refereed proceedings of the 18th International Conference on the Theory...
This book takes China Mobile's '5G +' plan as the mainline, introduces three major scenarios, nin...
This book takes China Mobile's '5G +' plan as the mainline, introduces three major scenarios, nin...
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology...