9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
Lecture Notes in Computer Science > Information and Communications Security > Applications > 113-125
Lecture Notes in Computer Science > Information and Communications Security > Applications > 126-140
Lecture Notes in Computer Science > Information and Communications Security > Applications > 141-152
Lecture Notes in Computer Science > Information and Communications Security > Applied Cryptography > 230-238
Lecture Notes in Computer Science > Information and Communications Security > Applied Cryptography > 239-253
Lecture Notes in Computer Science > Information and Communications Security > Applied Cryptography > 254-268
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 1-15
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 16-30
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 31-43
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 44-56
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 269-283
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 284-295
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 296-305
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 306-318
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures > 57-68
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures > 69-82
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures > 83-97
Lecture Notes in Computer Science > Information and Communications Security > Fast Implementations > 177-188
Lecture Notes in Computer Science > Information and Communications Security > Fast Implementations > 189-200