The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.