Foundations of Security, Protocols, and Equational Reasoning More Books Like This

Protocols, Strands, and Logic Protocols, Strands, and Logic
2021
Security and Cryptography for Networks Security and Cryptography for Networks
2016
Provable Security Provable Security
2015
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
2017
Advances in Cryptology – ASIACRYPT 2016 Advances in Cryptology – ASIACRYPT 2016
2016
Information Security Information Security
2015
Advances in Cryptology -- CRYPTO 2015 Advances in Cryptology -- CRYPTO 2015
2015
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2017
Information Security Practice and Experience Information Security Practice and Experience
2008
Public-Key Cryptography – PKC 2016 Public-Key Cryptography – PKC 2016
2016
Information Security Information Security
2007
Cryptography and Information Security in the Balkans Cryptography and Information Security in the Balkans
2015
Applied Cryptography and Network Security Applied Cryptography and Network Security
2011
Applied Cryptography and Network Security Applied Cryptography and Network Security
2016
Applied Cryptography and Network Security Applied Cryptography and Network Security
2010