This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th Internation...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by t...
This book constitutes the thoroughly refereed post-conference proceedings of the 11th Internation...
This book constitutes the thoroughly refereed post-conference proceedings of the 12th Internation...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th Internationa...
Invited Talks.- Cryptanalysis of the SFLASH Signature Scheme.- On the Evolution of User Authentic...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Internation...
Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Funda...
Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Funda...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the...