This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
In today’s world, data must be sent around the world cheaply and securely, and that requires orig...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
Hackers have uncovered the dark side of cryptography that device developed to defeat Trojan horse...
This book constitutes the post-conference proceedings of the 16th International Conference on Inf...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Intern...
This book constitutes the proceedings of the 10th International Conference on Network and System ...
This book constitutes the refereed post-conference proceedings of the Second International Confer...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
Normal0falsefalsefalseEN-USX-NONEX-NONE...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju ...
This book constitutes the proceedings of the 9th International Conference on Network and System S...