Speeding up secret computations with insecure auxiliary devices
CRYPTO '88 Proceedings on Advances in cryptology
Management guidelines for PC security
ACM SIGSMALL/PC Notes
Management guidelines for PC security
ACM SIGICE Bulletin
Smart Cards - Requirements, Properties, and Applications
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Hi-index | 0.00 |