🦃 Cozy up with autumn reads! Let our AI Librarian pick your perfect fireside book 🍁
Explore the literary world of this author
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confid...
8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings
Compiled from the proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, this volume co...
First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings
The intricate 3D structure of the CNS lends itself to multimedia presentation, and is depicted here by way of dynamic 3D models that can be freely rot...
Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999, Proceedings
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in...
Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost...
Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings
This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December...
...