The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp
[Lecture Notes in Computer Science] Information Security Volume 2433 || Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
โ Scribed by Chan, Agnes Hui; Gligor, Virgil
- Book ID
- 120987618
- Publisher
- Springer Berlin Heidelberg
- Year
- 2002
- Weight
- 168 KB
- Category
- Article
- ISBN
- 3540458115
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This Book Constitutes The Refereed Proceedings Of The First International Conference On Information Systems Security, Iciss 2005, Held In Calcutta, India In December 2005. The 19 Revised Papers Presented Together With 4 Invited Papers And 5 Ongoing Project Summaries Were Carefully Reviewed And Selec
This Book Constitutes The Refereed Proceedings Of The First International Conference On Information Systems Security, Iciss 2005, Held In Calcutta, India In December 2005. The 19 Revised Papers Presented Together With 4 Invited Papers And 5 Ongoing Project Summaries Were Carefully Reviewed And Selec
This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in t
The Icica 2010 Conference Provided A Forum For Engineers And Scientists In Academia, Industry, And Government To Address The Most Innovative Research And Development Including Technical Challenges And Social, Legal, Political, And Economic Issues, And To Present And Discuss Their Ideas, Results, Wor