Search results
Lecture Notes in Computer Science > Web Information Systems and Mining > Information Security > 384-389
Lecture Notes in Computer Science > Advances in Biometrics > Iris > 1060-1069
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Crypto Tools and Parameters > 340-355
NATO Science Series II: Mathematics, Physics and Chemistry > Cyberspace Security and Defense: Research Issues > Cryptography > 297-314
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Block Cipher and Stream Cipher > 21-32
Lecture Notes in Computer Science > Advanced Web and Network Technologies, and Applications > International Workshop on Metropolis/Enterprise Grid and Applications (MEGA 2006) > 659-663
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 527-536
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures, Tools and Applications > Cryptography > 181-192
Lecture Notes in Computer Science > Cellular Automata > 612-621
Lecture Notes in Computer Science > Modeling Decisions for Artificial Intelligence > Regular Papers > 122-133
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > General Tracks > 563-572
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Authentication/Threshold Protocols > 370-376
Lecture Notes in Computer Science > Parallel Problem Solving from Nature, PPSN XI > Multi-agent Systems and Parallel Approaches > 381-390
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Cryptography > 117-126
Lecture Notes in Computer Science > Computing and Combinatorics > Learning and Cryptography > 416-425
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Encryption Methods > 91-104
Lecture Notes in Computer Science > Computer Security - ESORICS 2000 > Electronic Commerce Protocols > 72-87
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Efficient Hardware I > 298-310
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Attacks on Public Key Systems > 53-61