Search results
Lecture Notes in Computer Science > Parallel Processing and Applied Mathematics > The Third Grid Applications and Middleware Workshop (GAMW’7) > 825-834
Lecture Notes in Computer Science > Information Hiding > Hiding in Unusual Content, Novel Applications > 206-220
Lecture Notes in Computer Science > OOER '95: Object-Oriented and Entity-Relationship Modeling > 44-54
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Public-Key Cryptography > 106-118
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Side-Channel Attacks > 374-388
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2005 > 723-734
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Cryptographic Protocols (II) > 324-338
Lecture Notes in Computer Science > Abstract State Machines, B and Z > Chapter 3. B Papers > 251-264
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC’99 > Cryptanalysis and Cryptographic Design > 30-37
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 338-344
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Topics in Complexities of Sequences > 168-179
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 318-329
Lecture Notes in Computer Science > Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream > Crypto Applications 2 > 845-852
Lecture Notes in Computer Science > Convergence and Hybrid Information Technology > Security Systems > 472-481
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > General Track on Advanced and Emerging Applications > 586-596
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems > Information Technology Security > 83-92
Lecture Notes in Computer Science > Information Security and Privacy > Symmetric Key Ciphers > 64-75