This book focuses on the different representations and cryptographic properties of Booleans funct...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile module...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by t...
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile module...
This book investigates novel accurate and efficient privacy-preserving techniques and their appli...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile mod...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by t...
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book investigates novel accurate and efficient privacy-preserving techniques and their ap...