Alexandra Boldyreva, Vladi...
The two-volume proceedings set LNCS 13940 and 13941 const...
Weizhi Meng, Simone Fisch...
This book constitutes the refereed proceedings of the 37t...
Kenneth Okereafor
This book demystifies Cybersecurity concepts using real-w...
Seong Oun Hwang, Intae Ki...
Proof techniques in cryptography are very difficult to un...
Brij B. Gupta, Mamta
This book provides every necessary detail required to dev...
W. Cary Huffman, Jon-Lark ...
Coding theory has grown into a discipline with many pract...
Mehdi Tibouchi, XiaoFeng ...
The LNCS two-volume set 13905 and LNCS 13906 constitutes ...
Sitharama S. Iyengar, Mari...
This book explains the evolution of techniques and strate...
Ravindra Das
In this book, we review both the concepts and mechanics b...
Sudeep Tanwar
Blockchain is an emerging technology platform for develop...
Ilya Dubinsky
The book is a one-stop source for cryptographic methods u...
Sanjay Misra, Amit Kumar ...
This book covers a variety of topics and trends related t...
Mike Rosulek
This book constitutes the refereed proceedings of the Cry...
Carmit Hazay, Martijn Stam
This five-volume set, LNCS 14004 - 14008 constitutes the ...
Carmit Hazay, Martijn Stam
This five-volume set, LNCS 14004 - 14008 constitutes the ...
Carmit Hazay, Martijn Stam
This five-volume set, LNCS 14004 - 14008 constitutes the ...
Felix Gunther, Julia Hesse
This book constitutes the refereed proceedings of the 8th...
Carmit Hazay, Martijn Stam
This five-volume set, LNCS 14004 - 14008 constitutes the ...