'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to an...
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology ...
This book constitutes the refereed proceedings of the Second International Conference on Provable...
This book constitutes the refereed proceedings of the Second International Information Security P...
This book constitutes the refereed proceedings of the 12th International Conference on the Theory...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-S...
'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to an...
This book constitutes the refereed proceedings of the 5th International Conference on Cryptolo...
Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chi...
This book constitutes the refereed proceedings of the Second International Conference on Provable...
Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chi...