Search results
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Track on Security Engineering > 665-671
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > ADCN 2011 Papers > 153-164
Lecture Notes in Computer Science > Information Security and Cryptology > Privacy and Deniability > 298-312
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Authentication and Identification > 384-401
Lecture Notes in Computer Science > Human Interface and the Management of Information. Interacting with Information > Security and Privacy > 359-365
Lecture Notes in Computer Science > Universal Acess in Human Computer Interaction. Coping with Diversity > Part IV: Understanding Diversity: Age > 942-949
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 135-149
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 411-424
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks > 124-135
Lecture Notes in Computer Science > Data and Applications Security and Privacy XXV > Authentication and Secret Sharing > 201-216
Lecture Notes in Computer Science > Multimedia Content Analysis and Mining > Invited Contributions > 65-75
Lecture Notes in Computer Science > Financial Cryptography > Game Theoretic and Cryptographic Tools > 212-226
Lecture Notes in Computer Science > Design, User Experience, and Usability. Theory, Methods, Tools and Practice > DUXU in Web Environment > 29-39