Print version sponsored by the IEEE Computer Society, Technical Committee on Security and Privacy in cooperation with the International Association for Cryptologic Research (IACR)
Notes
Description based on resource mounted on IEEE Digital Library Web site (viewed Oct. 24, 2005); title from print version record