Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Security Protocols XXV

More books from Springer International Publishing

bigCover of the book Gottlieb and Whitehead Center Groups of Spheres, Projective and Moore Spaces by
bigCover of the book Reversibility and Universality by
bigCover of the book Biotechnological Applications of the Yeast Yarrowia lipolytica by
bigCover of the book Marxist Historical Cultures and Social Movements during the Cold War by
bigCover of the book Immune Infertility by
bigCover of the book Random Sets and Random Fuzzy Sets as Ill-Perceived Random Variables by
bigCover of the book The Last Empires by
bigCover of the book The Product Manager's Toolkit® by
bigCover of the book Leadership Performance and Rhetoric by
bigCover of the book Latent Variable Analysis and Signal Separation by
bigCover of the book The Presence of God and the Presence of Persons by
bigCover of the book Hegel in the Arab World by
bigCover of the book Machine Learning and Intelligent Communications by
bigCover of the book Disney and the Dialectic of Desire by
bigCover of the book Complexity and Control in Quantum Photonics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy