103
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

104
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

105
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

106
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

107
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

108
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

109
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

110
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

111
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

112
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

113
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

114
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

115
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

116
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

118
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

119
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

120
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...