authentication key management privacy and authentication cryptographic protocols fuzzy systems wireless network security security management trust management untraceability information hiding data integrity biometric security computational intelligence in security quantum cryptography cryptography and coding
Tout plus