61
Published 2015
Springer International Publishing
...Security and Cryptology...

62
Published 2015
Springer International Publishing
...Security and Cryptology...

63
Published 2015
Springer International Publishing
...Security and Cryptology...

64
Published 2016
Springer International Publishing
...Security and Cryptology...

66
Published 2016
Springer International Publishing
...Security and Cryptology...

67
Published 2016
Springer International Publishing
...Security and Cryptology...

68
Published 2016
Springer International Publishing
...Security and Cryptology...

69
Published 2016
Springer International Publishing
...Security and Cryptology...

70
Published 2016
Springer International Publishing
...Security and Cryptology...

71
Published 2016
Springer International Publishing
...Security and Cryptology...

72
Published 2016
Springer International Publishing
...Security and Cryptology...

73
Published 2016
Springer International Publishing
...Security and Cryptology...

74
Published 2016
Springer International Publishing
...Security and Cryptology...

75
Published 2016
Springer International Publishing
...Security and Cryptology...

76
Published 2016
Springer International Publishing
...Security and Cryptology...

77
Published 2015
Springer International Publishing
...Security and Cryptology...

78
Published 2016
Springer International Publishing
...Security and Cryptology...

79
Published 2016
Springer International Publishing
...Security and Cryptology...