This book constitutes the refereed proceedings of the 14th International Conference on the Theory...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
The book studies modern concepts of Computer Security. It is selfcontained in the sense that it i...
InhaltsangabeTrusted third parties for secure electronic commerce - Are they needed.- Prospective...
This book constitutes the refereed proceedings of the Third International Conference on Provable ...
InhaltsangabeCryptanalysis.- Network security.- Cryptographic protocols.- Encryption.- S-box theory.
The book studies modern concepts of Computer Security. It is selfcontained in the sense that it i...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australias...
Proceedings of AUSCRYPT '90, the first IACR-sponsored conference on cryptology to be held in Aust...
InhaltsangabeInvited Talk.- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3...
InhaltsangabeOverview of hash functions.- Methods of attack on hash functions.- Pseudorandomness....