This book looks at graph theory as it connects to linear algebra, parallel computing, data struct...
InhaltsangabeInvited Paper.- Password-Based Authenticated Key Exchange: An Overview.- Practical a...
This book constitutes the refereed proceedings of the First International Conference on Provable ...
The contributors to this volume include many of the distinguished researchers in this area. Many ...
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Austr...
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Austr...
This book constitutes the proceedings of the 13th International Conference on Information Securit...
The contributors to this volume include many of the distinguished researchers in this area. Many ...
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information...
This book constitutes the proceedings of the 24rd International Conference on Information Securit...
This book constitutes the proceedings of the 18th International Conference on Provable and Practi...