1
Information and Communications Security [E-Book] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings /
2
Theory of Cryptography [E-Book] : 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings /
3
Transactions on Computational Science XI [E-Book] : Special Issue on Security in Computing, Part II /
4
Pairing-Based Cryptography - Pairing 2010 [E-Book] : 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings /
5
Provable Security [E-Book] : 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings /
6
Theory of Cryptography [E-Book] : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings /
7
Information and Communications Security [E-Book] : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings /
8
Foundations and Applications of Security Analysis [E-Book] : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers /
9
Combinatorial Optimization and Applications [E-Book] : Third International Conference, COCOA 2009, Huangshan, China, June 10-12, 2009. Proceedings /
10
Information Security and Privacy [E-Book] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /
11
Information and Communications Security [E-Book] : 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings /
12
Information Security and Privacy [E-Book] : 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings /
13
Computing and Combinatorics [E-Book] : 10th Annual International Conference, COCOON 2004, Jeju Island, Korea, August 17-20, 2004, Proceedings /