GPJ

Vis mig kun

Topics in Cryptology - CT-RSA 2017

Topics in Cryptology - CT-RSA 2017

Handschuh, Helena

436,85 DKK

Cryptology and Network Security

Cryptology and Network Security

Vaudenay, Serge

875,33 DKK

Cryptology and Network Security

Cryptology and Network Security

Naccache, David

403,64 DKK

Advances in Digital Forensics XIII

Advances in Digital Forensics XIII

Shenoi, Sujeet

692,63 DKK

Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Toma, Cristian

436,85 DKK

Computer Security - ESORICS 2022

Computer Security - ESORICS 2022

Meng, Weizhi

692,63 DKK

Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Toma, Cristian

436,85 DKK

Advances in Cryptology - EUROCRYPT 2022

Advances in Cryptology - EUROCRYPT 2022

Dziembowski, Stefan

948,41 DKK

Information Systems Security and Privacy

Information Systems Security and Privacy

Camp, Olivier

619,55 DKK

Database and Expert Systems Applications

Database and Expert Systems Applications

Ma, Hui

436,85 DKK

Information Security Applications

Information Security Applications

Choi, Dooho

436,85 DKK

Cyber-security of SCADA and Other Industrial Control Systems

Cyber-security of SCADA and Other Industrial Control Systems

Kott, Alexander

2190,77 DKK

Database and Expert Systems Applications

Database and Expert Systems Applications

Martinez-Gil, Jorge

436,85 DKK

Progress in Cryptology -- INDOCRYPT 2014

Progress in Cryptology -- INDOCRYPT 2014

Mukhopadhyay, Debdeep

436,85 DKK

Cyber Security, Cryptology, and Machine Learning

Cyber Security, Cryptology, and Machine Learning

Meisels, Amnon

802,25 DKK

Privacy Technologies and Policy

Privacy Technologies and Policy

Drogkaris, Prokopios

436,85 DKK

Security, Privacy, and Applied Cryptography Engineering

Security, Privacy, and Applied Cryptography Engineering

Solworth, Jon

436,85 DKK

Provable Security

Provable Security

Yiu, Siu Ming

436,85 DKK

Hardware Trojan War

Hardware Trojan War

Tehranipoor, Mark M.

875,33 DKK

Hardware Protection through Obfuscation

Hardware Protection through Obfuscation

Tehranipoor, Mark M.

875,33 DKK

Artificial Intelligence and Cybersecurity

Artificial Intelligence and Cybersecurity

Karjalainen, Mika

1313,81 DKK

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Guilley, Sylvain

436,85 DKK

Digital Forensics and Watermarking

Digital Forensics and Watermarking

Kim, Hyoung Joong

436,85 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Kiayias, Aggelos

436,85 DKK

Information and Communications Security

Information and Communications Security

Liu, Dongmei

436,85 DKK

HCI for Cybersecurity, Privacy and Trust

HCI for Cybersecurity, Privacy and Trust

Moallem, Abbas

436,85 DKK

Cryptography and Coding

Cryptography and Coding

O'Neill, Maire

436,85 DKK

Side-Channel Analysis of Embedded Systems

Side-Channel Analysis of Embedded Systems

Guilley, Sylvain

436,85 DKK

Topics in Cryptology - CT-RSA 2017

Topics in Cryptology - CT-RSA 2017

Handschuh, Helena

436,85 DKK

Human Choice and Digital by Default: Autonomy vs Digital Determination

Human Choice and Digital by Default: Autonomy vs Digital Determination

Ishii, Kaori

436,85 DKK