GPJ

Vis mig kun

Transactions on Data Hiding and Multimedia Security V

Transactions on Data Hiding and Multimedia Security V

Shi, Yun Q.

436,85 DKK

Algorithmic Number Theory

Algorithmic Number Theory

Buell, Duncan

875,33 DKK

Secure Data Management

Secure Data Management

Petkovic, Milan

436,85 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Smith, Matthew

403,64 DKK

IP Operations and Management

IP Operations and Management

Skianis, Charalabos

436,85 DKK

Advances in Digital Forensics VII

Advances in Digital Forensics VII

Shenoi, Sujeet

436,85 DKK

Introduction to Modern Number Theory

Introduction to Modern Number Theory

Panchishkin, Alexei A.

1313,81 DKK

Smart Spaces and Next Generation Wired/Wireless Networking

Smart Spaces and Next Generation Wired/Wireless Networking

Hu, Honglin

436,85 DKK

Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment

Laskov, Pavel

436,85 DKK

Information Hiding

Information Hiding

Bas, Patrick

436,85 DKK

Security, Privacy and Trust in Cloud Systems

Security, Privacy and Trust in Cloud Systems

Pathan, Mukaddim

875,33 DKK

State of the Art in Applied Cryptography

State of the Art in Applied Cryptography

Rijmen, Vincent

436,85 DKK

Safety and Security in Multiagent Systems

Safety and Security in Multiagent Systems

MASSACCI, Fabio

436,85 DKK

Public Key Infrastructure

Public Key Infrastructure

Gritzalis, Stefanos

436,85 DKK

Foundations of Security Analysis and Design

Foundations of Security Analysis and Design

Gorrieri, Roberto

436,85 DKK

Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Schreckling, Daniel

436,85 DKK

Availability, Reliability and Security for Business, Enterprise and Health Information Systems

Availability, Reliability and Security for Business, Enterprise and Health Information Systems

Xu, Lida

436,85 DKK

Information Security and Cryptology - ICISC'99

Information Security and Cryptology - ICISC'99

Song, JooSeok

436,85 DKK

Topics in Cryptology -- CT-RSA 2005

Topics in Cryptology -- CT-RSA 2005

Menezes, Alfred John

436,85 DKK

Computer Security

Computer Security

Soriano, Miguel

436,85 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Dhamija, Rachna

436,85 DKK

Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment

Sommer, Robin

436,85 DKK

Topics in Cryptology - CT-RSA 2001

Topics in Cryptology - CT-RSA 2001

Naccache, David

436,85 DKK

Einführung in die Quanteninformatik

Einführung in die Quanteninformatik

Brands, Gilbert

223,05 DKK

Progress in Cryptology - VIETCRYPT 2006

Progress in Cryptology - VIETCRYPT 2006

Nguyen, Phong Q.

436,85 DKK

Foundations of Security Analysis and Design V

Foundations of Security Analysis and Design V

Gorrieri, Roberto

403,64 DKK

Mobile Agents and Security

Mobile Agents and Security

Vigna, Giovanni

436,85 DKK

Digital Rights Management

Digital Rights Management

Feigenbaum, Joan

436,85 DKK

Algebraic Geometry for Coding Theory and Cryptography

Algebraic Geometry for Coding Theory and Cryptography

Walker, Judy L.

1386,89 DKK

Advances in Cryptology - CRYPTO 2018

Advances in Cryptology - CRYPTO 2018

Boldyreva, Alexandra

802,25 DKK