1
Published 2014
Springer International Publishing
...Security and Cryptology...

2
Published 2014
Springer International Publishing
...Security and Cryptology...

3
Published 2014
Springer International Publishing
...Security and Cryptology...

4
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

5
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

6
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

7
Published 2014
Springer International Publishing
...Security and Cryptology...

8
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

9
Published 2014
Springer International Publishing
...Security and Cryptology...

10
Published 2014
Springer International Publishing
...Security and Cryptology...

11
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

12
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

13
Published 2014
Springer Berlin Heidelberg
...Security and Cryptology...

14
Published 2014
Springer International Publishing
...Security and Cryptology...

15
Published 2014
Springer International Publishing
...Security and Cryptology...

16
Published 2014
Springer International Publishing
...Security and Cryptology...

17
Published 2014
Springer International Publishing
...Security and Cryptology...

18
Published 2014
Springer International Publishing
...Security and Cryptology...

19
Published 2014
Springer International Publishing
...Security and Cryptology...

20
Published 2014
Springer International Publishing
...Security and Cryptology...