12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
Lecture Notes in Computer Science > Information and Communications Security > Cryptographic Hash Functions: Theory and Practice > 1-3
Lecture Notes in Computer Science > Information and Communications Security > Session 1A. Access Control > 4-15
Lecture Notes in Computer Science > Information and Communications Security > Session 1A. Access Control > 16-30
Lecture Notes in Computer Science > Information and Communications Security > Session 1B. Public Key Cryptography and Cryptanalysis > 31-45
Lecture Notes in Computer Science > Information and Communications Security > Session 1B. Public Key Cryptography and Cryptanalysis > 46-61
Lecture Notes in Computer Science > Information and Communications Security > Session 1B. Public Key Cryptography and Cryptanalysis > 62-76
Lecture Notes in Computer Science > Information and Communications Security > Session 1C. Security in Distributed and Mobile Systems > 77-91
Lecture Notes in Computer Science > Information and Communications Security > Session 1C. Security in Distributed and Mobile Systems > 92-106
Lecture Notes in Computer Science > Information and Communications Security > Session 1C. Security in Distributed and Mobile Systems > 107-125