GPJ

Vis mig kun

Passive and Active Measurement

Passive and Active Measurement

Levin, Dave

802,25 DKK

ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

Welzer, Tatjana

1021,49 DKK

Progress in Cryptology - INDOCRYPT 2017

Progress in Cryptology - INDOCRYPT 2017

Smart, Nigel P.

436,85 DKK

Provable Security

Provable Security

Han, Jinguang

436,85 DKK

Electronic Voting

Electronic Voting

Solvak, Mihkel

436,85 DKK

Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Tunstall, Michael

436,85 DKK

Risk Assessment and Risk-Driven Quality Assurance

Risk Assessment and Risk-Driven Quality Assurance

Seehusen, Fredrik

436,85 DKK

Information Security

Information Security

Intan, Rolly

619,55 DKK

Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications

Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications

Tavares, Joao Manuel R.S.

436,85 DKK

Network and System Security

Network and System Security

Liu, Yang

619,55 DKK

Electronic Voting

Electronic Voting

Germann, Micha

473,39 DKK

Guide to Digital Forensics

Guide to Digital Forensics

Kavrestad, Joakim

473,39 DKK

Cryptology and Network Security

Cryptology and Network Security

Bellini, Emanuele

583,01 DKK

Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business

Khalil, Ismail

436,85 DKK

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Yegneswaran, Vinod

436,85 DKK

Security and Trust Management

Security and Trust Management

Foresti, Sara

403,64 DKK

Computer Security - ESORICS 2014

Computer Security - ESORICS 2014

Vaidya, Jaideep

436,85 DKK

Selected Areas in Cryptography

Selected Areas in Cryptography

Hulsing, Andreas

656,09 DKK

Guide to Digital Forensics

Guide to Digital Forensics

Kavrestad, Joakim

473,39 DKK

Feistel Ciphers

Feistel Ciphers

Volte, Emmanuel

1386,89 DKK

Protocols, Strands, and Logic

Protocols, Strands, and Logic

Rowe, Paul

619,55 DKK

Blocks and Chains

Blocks and Chains

Weippl, Edgar

265,81 DKK

Electronic Voting

Electronic Voting

Teague, Vanessa

436,85 DKK

Digital Forensics and Watermarking

Digital Forensics and Watermarking

Comesana-Alfaro, Pedro

509,93 DKK

Feistel Ciphers

Feistel Ciphers

Volte, Emmanuel

1386,89 DKK

Privacy and Identity Management. Between Data Protection and Security

Privacy and Identity Management. Between Data Protection and Security

Schiffner, Stefan

692,63 DKK

Information Security Theory and Practice

Information Security Theory and Practice

Jajodia, Sushil

436,85 DKK

Foundations of Security Analysis and Design VIII

Foundations of Security Analysis and Design VIII

Martinelli, Fabio

359,43 DKK

Protocols, Strands, and Logic

Protocols, Strands, and Logic

Rowe, Paul

619,55 DKK

Guide to Automotive Connectivity and Cybersecurity

Guide to Automotive Connectivity and Cybersecurity

Haas, Roland E.

802,25 DKK