This book constitutes the thoroughly refereed post-conference proceedings of the 6th Internationa...
This book constitutes the refereed proceedings of the 11th International Workshop on Information ...
Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horse...
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cr...
This book constitutes the post-conference proceedings of the 14th International Conference on Inf...
The 18 full and 10 short papers presented in this volume were carefully reviewed and selected fro...
This book constitutes the proceedings of the Second International Conference on Science of Cyber ...
Complete with Springer's trademark online files and updates, this fascinating text constitutes th...
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju ...
Here are the refereed proceedings of the 9th International Conference on Theory and Practice in P...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by t...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th Internation...