|
Protocols for Authentication and Key Establishment
by
really liked it 4.00 avg rating — 9 ratings
—
published
2003
—
9 editions
|
|
|
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 (Lecture Notes in Computer Science, 6503)
by
0.00 avg rating — 0 ratings
—
published
2010
|
|
|
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010
by
0.00 avg rating — 0 ratings
—
published
2011
—
2 editions
|
|
|
Protocols for Authentication and Key Establishment
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.