Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Security Protocols XXV

More books from Springer International Publishing

bigCover of the book Symmetries in Fundamental Physics by
bigCover of the book Machine Learning for Text by
bigCover of the book Sinus Grafting Techniques by
bigCover of the book Parallel Computing Technologies by
bigCover of the book The Myth of Mao Zedong and Modern Insurgency by
bigCover of the book Acute Promyelocytic Leukemia by
bigCover of the book Hayek: A Collaborative Biography by
bigCover of the book Nano-Oncologicals by
bigCover of the book Fuzzy Information and Engineering and Decision by
bigCover of the book Cruel Children in Popular Texts and Cultures by
bigCover of the book Reflections on Qualitative Research in Language and Literacy Education by
bigCover of the book Indicator-Based Monitoring of Regional Economic Integration by
bigCover of the book Human Security and Cross-Border Cooperation in East Asia by
bigCover of the book Control and Filtering for Semi-Markovian Jump Systems by
bigCover of the book Integral Transform Techniques for Green's Function by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy