This book focuses on the different representations and cryptographic properties of Booleans funct...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th Internationa...
It is commonly known that information security includes data confidentiality, data integrity, and...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th Internationa...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book presents a systematic and comprehensive overview for IoT security. It first introduc...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book presents a systematic and comprehensive overview for IoT security. It first introduc...