The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile mod...
This book focuses on the different representations and cryptographic properties of Booleans funct...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by t...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile module...
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book focuses on the different representations and cryptographic properties of Booleans funct...
This book investigates novel accurate and efficient privacy-preserving techniques and their appli...
This book investigates novel accurate and efficient privacy-preserving techniques and their appli...