๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Applied Cryptography and Network Security Volume 3531 || Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA

โœ Scribed by Ioannidis, John; Keromytis, Angelos; Yung, Moti


Book ID
120336951
Publisher
Springer Berlin Heidelberg
Year
2005
Weight
285 KB
Category
Article
ISBN
354031542X

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Appl
โœ Abdalla, Michel; Pointcheval, David; Fouque, Pierre-Alain; Vergnaud, Damien ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 226 KB

This Book Constitutes The Refereed Proceedings Of The 7th International Conference On Applied Cryptography And Network Security, Acns 2009, Held In Paris-rocquencourt, France, In June 2009. The 32 Revised Full Papers Presented Were Carefully Reviewed And Selected From 150 Submissions. The Papers Are

[Lecture Notes in Computer Science] Appl
โœ Jakobsson, Markus; Yung, Moti; Zhou, Jianying ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 217 KB

The Second International Conference On Applied Cryptography And Network Security (acns 2004) Was Sponsored And Organized By Icisa (the International Communications And Information Security Association). It Was Held In Yellow Mountain, China, June 8โ€“11, 2004. The Conference Proceedings, Representing

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 437 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp