181
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

182
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

183
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

185
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

186
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

187
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

188
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

189
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

190
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

191
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

192
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

194
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

195
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

196
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

198
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

200
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...