Search results
Lecture Notes in Computer Science > Information Hiding > 157-168
Lecture Notes in Computer Science > Financial Cryptography > Game Theoretic and Cryptographic Tools > 212-226
Lecture Notes in Computer Science > Haptics: Perception, Devices and Scenarios > Control and Technology > 114-121
Lecture Notes in Computer Science > Security in Pervasive Computing > Session 4: Authentication (II) > 101-116
Lecture Notes in Computer Science > Trusted Computing - Challenges and Applications > TRUST 2008 > 92-106
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 88 > Signatures and Authentication > 216-231
Lecture Notes in Computer Science > Electronic Government and the Information Systems Perspective > Information Modelling and Integration > 120-133
IFIP — The International Federation for Information Processing > Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government > e-Marketplaces, e-Hubs, and Portals > 465-479
Communications in Computer and Information Science > Global Security, Safety, and Sustainability > 96-103
IFMBE Proceedings > World Congress on Medical Physics and Biomedical Engineering, September 7 - 12, 2009, Munich, Germany > 28-31