'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to...
This book constitutes the refereed proceedings of the Second International Conference on Provable...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to an...
InhaltsangabeForeword. Preface. Randomness and Discrepancy Transforms; Guang Gong. Legendre Seque...
This volume contains the Research Track proceedings of the Second Information Security Practice a...
Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-S...