141
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

142
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

143
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

144
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

145
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

146
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

147
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

148
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

150
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

151
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

152
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

154
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

156
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

158
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

159
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

160
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...