GPJ

Vis mig kun

Security Standardisation Research

Security Standardisation Research

Mehrnezhad, Maryam

436,85 DKK

Security and Trust Management

Security and Trust Management

Zhou, Jianying

509,93 DKK

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Saxena, Nitesh

875,33 DKK

Information Security and Privacy

Information Security and Privacy

Stebila, Douglas

436,85 DKK

Cryptographic Applications of Analytic Number Theory

Cryptographic Applications of Analytic Number Theory

Shparlinski, Igor

875,33 DKK

Human Aspects of Information Security and Assurance

Human Aspects of Information Security and Assurance

Furnell, Steven

436,85 DKK

Secure IT Systems

Secure IT Systems

Brumley, Billy Bob

509,93 DKK

Security Standardisation Research

Security Standardisation Research

Mehrnezhad, Maryam

436,85 DKK

Progress in Cryptology -- INDOCRYPT 2015

Progress in Cryptology -- INDOCRYPT 2015

Goyal, Vipul

436,85 DKK

Quantum Computing Environments

Quantum Computing Environments

Kumar, KJ Latesh

1021,49 DKK

Mobile Networks and Management

Mobile Networks and Management

Wen, Sheng

436,85 DKK

Creativity in Intelligent Technologies and Data Science

Creativity in Intelligent Technologies and Data Science

Groumpos, Peter P.

436,85 DKK

Risks and Security of Internet and Systems

Risks and Security of Internet and Systems

Gabillon, Alban

436,85 DKK

Advances in Cryptology - EUROCRYPT 2017

Advances in Cryptology - EUROCRYPT 2017

Nielsen, Jesper Buus

802,25 DKK

Information Systems Security and Privacy

Information Systems Security and Privacy

Camp, Olivier

619,55 DKK

Security and Trust Management

Security and Trust Management

Zhou, Jianying

509,93 DKK

Computer Security -- ESORICS 2015

Computer Security -- ESORICS 2015

Weippl, Edgar

436,85 DKK

Protecting Privacy through Homomorphic Encryption

Protecting Privacy through Homomorphic Encryption

Laine, Kim

875,33 DKK

Technology and Practice of Passwords

Technology and Practice of Passwords

Thorsheim, Per

359,43 DKK

Hardware Trojan War

Hardware Trojan War

Tehranipoor, Mark M.

875,33 DKK

Hardware Protection through Obfuscation

Hardware Protection through Obfuscation

Tehranipoor, Mark M.

875,33 DKK

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Guilley, Sylvain

436,85 DKK

HCI for Cybersecurity, Privacy and Trust

HCI for Cybersecurity, Privacy and Trust

Moallem, Abbas

436,85 DKK

Privacy in Statistical Databases

Privacy in Statistical Databases

Domingo-Ferrer, Josep

436,85 DKK

Protecting Privacy through Homomorphic Encryption

Protecting Privacy through Homomorphic Encryption

Laine, Kim

875,33 DKK

Network and System Security

Network and System Security

Zhang, Haibo

436,85 DKK

Security Protocols XXIII

Security Protocols XXIII

Anderson, Jonathan

436,85 DKK

Cryptology and Network Security

Cryptology and Network Security

Vaudenay, Serge

875,33 DKK

Security and Privacy

Security and Privacy

Debnath, Sumit Kumar

509,93 DKK

Guide to Security in SDN and NFV

Guide to Security in SDN and NFV

Hill, Richard

403,64 DKK