Wyniki wyszukiwania
Lecture Notes in Computer Science > Rough Sets and Knowledge Technology > Pattern Recognition > 671-678
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2007 > Multivariate Cryptosystems > 266-281
Lecture Notes in Computer Science > Advances in Multimedia Information Processing – PCM 2007 > Session-5: Media Security and DRM > 246-255
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > P2P, WSN and Ad Hoc Networks > 435-449
Lecture Notes in Computer Science > Communications and Multimedia Security > Applied Cryptography > 233-244
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Rijndael Hardware Implementations > 65-76
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Other Security Research > 337-346
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Bilinear Pairing > 177-190
Lecture Notes in Computer Science > Web Information Systems and Mining > Information Security > 426-438
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Cryptography and Lattices > 595-618
Lecture Notes in Computer Science > Management of Multimedia Networks and Services > Multimedia QoS Management > 381-395
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Internet Communication Security Workshop > 978-987
Lecture Notes in Computer Science > On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops > Workshop on Metadata for Security (WMS) > 704-717
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Public Key Encryption > 1-18
Lecture Notes in Computer Science > Software Security - Theories and Systems > Part 1: Analysis of Protocols and Cryptography > 87-112