GPJ

Vis mig kun

Selected Areas in Cryptography

Selected Areas in Cryptography

O'Flynn, Colin

436,85 DKK

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Regazzoni, Francesco

436,85 DKK

Proceedings of the 2nd Workshop on Communication Security

Proceedings of the 2nd Workshop on Communication Security

Tomasin, Stefano

1240,73 DKK

Advances in Cryptology - CRYPTO 2017

Advances in Cryptology - CRYPTO 2017

Shacham, Hovav

875,33 DKK

Engineering Secure Software and Systems

Engineering Secure Software and Systems

Bielova, Nataliia

436,85 DKK

Cyber Security Cryptography and Machine Learning

Cyber Security Cryptography and Machine Learning

Lodha, Sachin

509,93 DKK

Computer Security

Computer Security

Sasse, Angela

436,85 DKK

Radio Frequency Identification: Security and Privacy Issues

Radio Frequency Identification: Security and Privacy Issues

Sadeghi, Ahmad-Reza

403,64 DKK

Arithmetic, Geometry, and Coding Theory

Arithmetic, Geometry, and Coding Theory

Vladut, S.G.

1240,73 DKK

Engineering Secure Software and Systems

Engineering Secure Software and Systems

Athanasopoulos, Elias

436,85 DKK

Distributed Computing for Emerging Smart Networks

Distributed Computing for Emerging Smart Networks

Mosbah, Mohamed

509,93 DKK

Elliptic Curves

Elliptic Curves

Zimmer, Horst G.

1167,65 DKK

Open Problems in Network Security

Open Problems in Network Security

Kesdogan, Dogan

436,85 DKK

Applied Cryptography in Computer and Communications

Applied Cryptography in Computer and Communications

Huang, Xinyi

619,55 DKK

Cyber Denial, Deception and Counter Deception

Cyber Denial, Deception and Counter Deception

Tsow, Alexander W.

1167,65 DKK

Data Analytics and Decision Support for Cybersecurity

Data Analytics and Decision Support for Cybersecurity

Huang, Yan

1021,49 DKK

Data Privacy Management, and Security Assurance

Data Privacy Management, and Security Assurance

Suri, Neeraj

875,33 DKK

Trust and Trustworthy Computing

Trust and Trustworthy Computing

Papadimitratos, Panos

436,85 DKK

Critical Information Infrastructures Security

Critical Information Infrastructures Security

Popov, Peter

509,93 DKK

Security and Trust Management

Security and Trust Management

Petrocchi, Marinella

403,64 DKK

Computer Security

Computer Security

Furnell, Steven

436,85 DKK

Engineering Software for Modern Challenges

Engineering Software for Modern Challenges

Kazmi, Rafaqut

509,93 DKK

Digital Forensics and Watermarking

Digital Forensics and Watermarking

Kim, Hyoung Joong

436,85 DKK

Computer Security - ESORICS 2016

Computer Security - ESORICS 2016

Meadows, Catherine

436,85 DKK

Advances in Cryptology - EUROCRYPT 2017

Advances in Cryptology - EUROCRYPT 2017

Nielsen, Jesper Buus

802,25 DKK

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Lu, Rongxing

875,33 DKK

Advances in Cryptology - EUROCRYPT 2017

Advances in Cryptology - EUROCRYPT 2017

Nielsen, Jesper Buus

802,25 DKK

Side-Channel Analysis of Embedded Systems

Side-Channel Analysis of Embedded Systems

Guilley, Sylvain

436,85 DKK

Security and Privacy

Security and Privacy

Debnath, Sumit Kumar

509,93 DKK

Trust, Privacy, and Security in Digital Business

Trust, Privacy, and Security in Digital Business

Pernul, Gunther

403,64 DKK