This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
In today’s world, data must be sent around the world cheaply and securely, and that requires orig...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
Hackers have uncovered the dark side of cryptography that device developed to defeat Trojan horse...
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International...
This book constitutes the proceedings of the 10th International Conference on Network and System ...
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th In...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Intern...
This book constitutes the refereed post-conference proceedings of the Second International Confer...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
Normal0falsefalsefalseEN-USX-NONEX-NONE...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju ...