Rankings
Publications
Search Publications
Cited-By Search
Sources
Publishers
Scholars
Scholars
Top Cited Scholars
Organizations
About
Login
Register
Home
Publications
Information Security and Cryptology
Home
Publications
Information Security and Cryptology
Information Security and Cryptology
Publisher Website
Google Scholar
Add to Library
Cite
Download
Share
Download
1 January 2005
book
Published by
Springer Nature
https://doi.org/10.1007/11599548
Abstract
No abstract available
Keywords
AUTHENTICATION
BLUETOOTH SECURITY
CRYPTANALYSIS
CRYPTOGRAPHIC PROTOCOLS
CRYPTOGRAPHY
DOS ATTACKS
ERROR-CORRECTING CODE
INFORMATION
INTRUSION DETECTION
SECURE COMPUTATION
SECURE PROXY
SECURITY MODELING
SIGNATURE SCHEMES
SYSTEMS SECURITY
THRESHOLD CRYPTOGRAPHY
References
Cited
This publication has 0 references indexed in Scilit:
Scroll to top