GPJ

Vis mig kun

Recent Advances in Intrusion Detection

Recent Advances in Intrusion Detection

Deri, Luca

436,85 DKK

Formal Aspects in Security and Trust

Formal Aspects in Security and Trust

Guttman, Joshua D.

436,85 DKK

Privacy and Identity Management for Life

Privacy and Identity Management for Life

Zhang, Ge

436,85 DKK

Autonomic and Trusted Computing

Autonomic and Trusted Computing

Yang, Laurence Tianruo

875,33 DKK

Provable Security

Provable Security

Reyhanitabar, Reza

436,85 DKK

Advances in Information and Computer Security

Advances in Information and Computer Security

Rannenberg, Kai

436,85 DKK

Trust and Trustworthy Computing

Trust and Trustworthy Computing

Beres, Yolanta

436,85 DKK

New Codebreakers

New Codebreakers

Quisquater, Jean-Jacques

436,85 DKK

Digital Watermarking

Digital Watermarking

Cox, Ingemar J.

875,33 DKK

Advances in Cryptology - CRYPTO 2004

Advances in Cryptology - CRYPTO 2004

Franklin, Matt

875,33 DKK

Applied Quantum Cryptography

Applied Quantum Cryptography

Pivk, Mario

583,01 DKK

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks

Niccolini, Saverio

436,85 DKK

Protecting Persons While Protecting the People

Protecting Persons While Protecting the People

Lesk, Michael E.

436,85 DKK

Advances in Cryptology 1981 - 1997

Advances in Cryptology 1981 - 1997

Ziegler, Claus D.

875,33 DKK

Computer Security - ESORICS 2003

Computer Security - ESORICS 2003

Gollmann, Dieter

436,85 DKK

Critical Information Infrastructures Security

Critical Information Infrastructures Security

Lopez, Javier

436,85 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Blythe, Jim

403,64 DKK

LATIN 2002: Theoretical Informatics

LATIN 2002: Theoretical Informatics

Rajsbaum, Sergio

875,33 DKK

ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

Kutylowski, Miroslaw

875,33 DKK

Information Security

Information Security

Ilic, Ivana

436,85 DKK

Information Security

Information Security

Mao, Wenbo

436,85 DKK

Principles of Security and Trust

Principles of Security and Trust

Ryan, Mark

436,85 DKK

Adaptive Inventories

Adaptive Inventories

Rossiter, Erin L.

165,78 DKK

Information Theory and Coding by Example

Information Theory and Coding by Example

Suhov, Yuri

329,95 DKK

 Multivariate Public Key Cryptosystems

Multivariate Public Key Cryptosystems

Schmidt, Dieter S.

1240,73 DKK

Practical Introduction to Regression Discontinuity Designs

Practical Introduction to Regression Discontinuity Designs

Titiunik, Rocio

165,78 DKK

Monograms and Ciphers

Monograms and Ciphers

Turbayne, Albert Angus

77,76 DKK

Cybersecurity in Humanities and Social Sciences

Cybersecurity in Humanities and Social Sciences

Aden, Hartmut

1313,81 DKK

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory

Carlet, Claude

656,09 DKK

Agent-Based Models of Polarization and Ethnocentrism

Agent-Based Models of Polarization and Ethnocentrism

Laver, Michael

165,78 DKK