Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Security Protocols XXV

More books from Springer International Publishing

bigCover of the book Proteinuria: Basic Mechanisms, Pathophysiology and Clinical Relevance by
bigCover of the book Dense Image Correspondences for Computer Vision by
bigCover of the book Advances in Spatial and Temporal Databases by
bigCover of the book The Quest for Subsidy Reforms in the Middle East and North Africa Region by
bigCover of the book Peacebuilding in Deeply Divided Societies by
bigCover of the book Clinical Image-Based Procedures. Translational Research in Medical Imaging by
bigCover of the book High-Utility Pattern Mining by
bigCover of the book Beastly Blake by
bigCover of the book International Conference on Theory and Application in Nonlinear Dynamics (ICAND 2012) by
bigCover of the book Analytic Number Theory by
bigCover of the book Symbiotic Interaction by
bigCover of the book Low-Carbon Energy in Africa and Latin America by
bigCover of the book Smart Computing and Communication by
bigCover of the book A First Example of a Lyotropic Smectic C* Analog Phase by
bigCover of the book Multiple Choice Questions in Pain Management by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy