Related Books
Language: en
Pages: 343
Pages: 343
Type: BOOK - Published: 2013-03-09 - Publisher: Springer Science & Business Media
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, whi
Language: en
Pages: 229
Pages: 229
Type: BOOK - Published: 2008-10-25 - Publisher: Springer Science & Business Media
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field
Language: en
Pages: 382
Pages: 382
Type: BOOK - Published: 2009-11-27 - Publisher: Springer Science & Business Media
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techn
Language: en
Pages: 408
Pages: 408
Type: BOOK - Published: 2008-11-02 - Publisher: Springer Science & Business Media
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28–31, 2007 in
Language: en
Pages: 574
Pages: 574
Type: BOOK - Published: 2011-04-14 - Publisher: World Scientific
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authori