GPJ

Vis mig kun

Secure Data Management

Secure Data Management

Petkovic, Milan

436,85 DKK

Theory of Security and Applications

Theory of Security and Applications

Palamidessi, Catuscia

436,85 DKK

Information and Communication Security

Information and Communication Security

Mu, Yi

436,85 DKK

Progress in Cryptology - INDOCRYPT 2010

Progress in Cryptology - INDOCRYPT 2010

Gupta, Kishan Chand

436,85 DKK

Quality, Reliability, Security and Robustness in Heterogeneous Networks

Quality, Reliability, Security and Robustness in Heterogeneous Networks

Awasthi, Amit K.

875,33 DKK

Moderne Verfahren der Kryptographie

Moderne Verfahren der Kryptographie

Wolfenstetter, Klaus-Dieter

322,59 DKK

Information Security and Cryptology - ICISC 2007

Information Security and Cryptology - ICISC 2007

Rhee, Gwangsoo

436,85 DKK

Information Security Applications

Information Security Applications

Yung, Moti

436,85 DKK

Digital Watermarking

Digital Watermarking

Lee, Heung-Kyu

436,85 DKK

Binary Quadratic Forms

Binary Quadratic Forms

Vollmer, Ulrich

436,85 DKK

Public Key Cryptography - PKC 2010

Public Key Cryptography - PKC 2010

Pointcheval, David

656,09 DKK

SEMPER - Secure Electronic Marketplace for Europe

SEMPER - Secure Electronic Marketplace for Europe

Waidner, Michael

436,85 DKK

Selected Areas in Cryptography

Selected Areas in Cryptography

Meijer, Henk

436,85 DKK

Composition of Secure Multi-Party Protocols

Composition of Secure Multi-Party Protocols

Lindell, Yehuda

436,85 DKK

Distributed Computing and Internet Technology

Distributed Computing and Internet Technology

Ramaswamy, Srini

436,85 DKK

Public Key Cryptography - PKC 2006

Public Key Cryptography - PKC 2006

Malkin, Tal

436,85 DKK

Computer Security - ESORICS 2011

Computer Security - ESORICS 2011

Diaz, Claudia

436,85 DKK

Public Key Infrastructure

Public Key Infrastructure

Zhao, Gansen

436,85 DKK

Advances in Information and Computer Security

Advances in Information and Computer Security

Nishigaki, Masakatsu

436,85 DKK

Cryptographic Hardware and Embedded Systems - CHES 2006

Cryptographic Hardware and Embedded Systems - CHES 2006

Matsui, Mitsuru

436,85 DKK

Global Security, Safety, and Sustainability

Global Security, Safety, and Sustainability

Hessami, Ali G.

436,85 DKK

Chipkarten als Sicherheitswerkzeug

Chipkarten als Sicherheitswerkzeug

Pfau, Axel

295,53 DKK

Security in Computing Systems

Security in Computing Systems

Biskup, Joachim

1240,73 DKK

Algorithmic Number Theory

Algorithmic Number Theory

Pohst, Michael

875,33 DKK

Information Security Applications

Information Security Applications

Yung, Moti

436,85 DKK

Trust, Privacy, and Security in Digital Business

Trust, Privacy, and Security in Digital Business

Pernul, Gunther

436,85 DKK

Theory of Cryptography

Theory of Cryptography

Vadhan, Salil P.

875,33 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Sadeghi, Ahmad-Reza

436,85 DKK

Information Systems Security

Information Systems Security

Gupta, Shyam K.

436,85 DKK

Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz

Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz

Pfitzmann, Andreas

337,32 DKK