Research oriented non-repudiation protocols have been active since the beginning of this mille...
This book constitutes the refereed proceedings of the 14th International Conference on Informatio...
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Internationa...
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. I...
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. I...
This book constitutes the refereed proceedings of the 20th International Conference on Informatio...
This book constitutes the refereed proceedings of the 15th International Conference on Informatio...
This volume contains the proceedings of the 4th International Conference on - formation and Commu...
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was he...
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was ...
This volume contains the proceedings of the 8th International Information - curity Conference (IS...
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was hel...