This book investigates tradeoff between security and usability in designing leakage resilient pas...
This book constitutes the refereed conference proceedings of the 12th International Conference on...
This volume contains the proceedings of the 4th International Conference on - formation and Commu...
Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral ...
This book constitutes the refereed proceedings of the 9th International Conference on Information...
A Generalized Wiener Attack on RSA.- Cryptanalysis of a Public-Key Encryption Scheme Based on the...
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 1...
This book constitutes the proceedings of the 12th International Conference on Information Securit...
This book reports the latest results in the study of Bistatic Multistatic SAR system and signal p...
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cr...
SiMLA - Security in Machine Learning and its Applications.- Risk-based Static Authentication in W...
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology...