Security of Ubiquitous Computing Systems Selected Topics
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cry...
I tiakina i:
Ētahi atu kaituhi: | , |
---|---|
Hōputu: | Tāhiko Wāhanga pukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Springer Nature
2021
|
Ngā marau: | |
Urunga tuihono: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ipurangi
OAPEN Library: download the publicationOAPEN Library: description of the publication
3rd Floor Main Library
Tau karanga: |
A1234.567 |
---|---|
Tārua 1 | Wātea |