Based on the research experience of the authors, this book provides a theoretical structure of fu...
This book constitutes the refereed proceedings of the 10th International Conference on Practice a...
This book constitutes the proceedings of the 17th International Conference on the Theory and Appl...
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology...
This book constitutes the refereed proceedings of the 18th International Conference on the Theory...
This book takes China Mobile's '5G +' plan as the mainline, introduces three major scenarios, nin...
This book constitutes the refereed proceedings of the 18th International Conference on the Theory...
This book takes China Mobile's '5G +' plan as the mainline, introduces three major scenarios, nin...
This book takes China Mobile's '5G +' plan as the mainline, introduces three major scenarios, nin...
This book constitutes the refereed proceedings of the 10th International Conference on Practic...
In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more...