Search for persons
X
?
Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science ,
1
Can a Differential Attack Work for an Arbitrarily Large Num..:
, In:
?
2
SOFSEM 2015: theory and practice of computer science
41st International Conference on Current Trends in Theory a...
Lecture notes in computer science ; 8939, Advanced research in computing and software science
?
8
Information security theory and practice
smart devices, pervasive systems, and ubiquitous networks ;...
Lecture notes in computer science ; 5746
?
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security ,
9
Authenticated wireless roaming via tunnels : making mobi..:
, In:
?
10
Information Security Theory and Practices. Smart Cards, Mob..
First IFIP TC6
Lecture Notes in Computer Science ; 4462
?
Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems ,
12