Search results for: Juan Manuel González Nieto
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Cryptographic Protocols > 17-32
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Key Management and Key Exchange > 34-46
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Provable Security: Public Key Cryptography > 176-190
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Finite Field Arithmetic for Pairing Based Cryptography > 196-214
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2009 > Applications and Protocols > 105-123
Lecture Notes in Computer Science > Cryptology and Network Security > Denial of Service Attacks > 247-264
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Authentication > 388-401
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Elliptic Curves > 203-224
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Specialized Multiparty Cryptography > 161-174
Lecture Notes in Computer Science > Mobility Aware Technologies and Applications > Security Issues > 264-274
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 616-625
Lecture Notes in Computer Science > Information Security and Privacy > Mobile and Network Security > 166-179
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Key Management and Key Exchange > 1-15
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 795-807