GPJ

Vis mig kun

Reader of Gentlemen's Mail

Reader of Gentlemen's Mail

David Kahn, Kahn

223,05 DKK

Bi-Literal Cypher of Francis Bacon

Bi-Literal Cypher of Francis Bacon

Gallup, Elizabeth Wells

59,77 DKK

Cryptography

Cryptography

Langie, Andre

546,47 DKK

New Testament Autographs

New Testament Autographs

Harris, J. Rendel

59,77 DKK

Manual for the Solution of Military Ciphers

Manual for the Solution of Military Ciphers

Hitt, Parker

68,60 DKK

Ciphers for the Little Folks

Ciphers for the Little Folks

Crain, Dorothy

59,77 DKK

Keys for Deciphering the Greatest Work of Sir Francis Bacon, Baron of Verulam, Viscount St. Alban

Keys for Deciphering the Greatest Work of Sir Francis Bacon, Baron of Verulam, Viscount St. Alban

Laboratories, Riverbank

68,60 DKK

Baconian Mint

Baconian Mint

Willis, William

59,77 DKK

Bacon Is Shakespeare

Bacon Is Shakespeare

Durning-Lawrence, Edwin

85,76 DKK

Boycotted Shakespeare Facts

Boycotted Shakespeare Facts

Parsons, J. Denham

59,77 DKK

Some Acrostic Signatures of Francis Bacon, Baron Verulam of Verulam, Viscount St. Alban

Some Acrostic Signatures of Francis Bacon, Baron Verulam of Verulam, Viscount St. Alban

Booth, William Stone

114,00 DKK

Cryptography of Dante

Cryptography of Dante

Arensberg, Walter

104,11 DKK

Prodromi, or Discoveries in the Bacon Cipher Problem

Prodromi, or Discoveries in the Bacon Cipher Problem

Wigston, William Francis C.

59,77 DKK

Hermes Stella

Hermes Stella

Wigston, William Francis C.

77,76 DKK

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Gallup, Elizabeth Wells

77,76 DKK

RFID Security

RFID Security

Zhang, Yan

1240,73 DKK

Mystery of the Marbles

Mystery of the Marbles

Stilwell, Charles B.

59,77 DKK

Error Correcting Coding and Security for Data Networks

Error Correcting Coding and Security for Data Networks

Semenov, Sergei

1240,73 DKK

New Approaches for Security, Privacy and Trust in Complex Environments

New Approaches for Security, Privacy and Trust in Complex Environments

Solms, Rossouw von

875,33 DKK

Cryptography or the History, Principles, and Practice of Cipher-Writing

Cryptography or the History, Principles, and Practice of Cipher-Writing

Hulme, F. Edward

68,60 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Fundamental Principles of the Baronian Ciphers

Fundamental Principles of the Baronian Ciphers

Falyan, Georg

59,77 DKK

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Grzech, Adam

1240,73 DKK

Security without Obscurity

Security without Obscurity

Stapleton, Jeff

403,64 DKK

Protecting Information

Protecting Information

Wootters, William K.

802,25 DKK

Secure Information Networks

Secure Information Networks

Preneel, Bart

2190,77 DKK

Security in the Information Society

Security in the Information Society

Aslan, Heba K.

1240,73 DKK

Complexity and Cryptography

Complexity and Cryptography

Welsh, Dominic

1240,73 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Computational Complexity

Computational Complexity

Barak, Boaz

509,93 DKK