1
Published 2009
Springer Berlin Heidelberg
...Security and Cryptology...

2
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

3
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

4
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

5
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

6
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

7
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

8
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

9
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

10
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

11
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

12
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

13
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

14
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

15
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

16
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

17
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

18
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

19
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

20
Published 2011
Springer Berlin Heidelberg
...Security and Cryptology...