GPJ

Vis mig kun

Digital Privacy

Digital Privacy

Sommer, Dieter

875,33 DKK

Communications and Multimedia Security

Communications and Multimedia Security

Uhl, Andreas

436,85 DKK

Progress in Cryptology -- AFRICACRYPT 2011

Progress in Cryptology -- AFRICACRYPT 2011

Pointcheval, David

436,85 DKK

Information Hiding

Information Hiding

Ker, Andrew

436,85 DKK

Cryptographic Hardware and Embedded Systems - CHES 2004

Cryptographic Hardware and Embedded Systems - CHES 2004

Quisquater, Jean-Jaques

436,85 DKK

Transactions on Data Hiding and Multimedia Security VII

Transactions on Data Hiding and Multimedia Security VII

Shi, Yun Qing

436,85 DKK

Distributed Computing and Networking

Distributed Computing and Networking

Wu, Jie

875,33 DKK

Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security

Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security

Popyack, Leonard J.

619,55 DKK

Security and Trust Management

Security and Trust Management

Fernandez-Gago, Carmen

436,85 DKK

Computer Security

Computer Security

Soriano, Miguel

436,85 DKK

Policies and Research in Identity Management

Policies and Research in Identity Management

Mitchell, Chris J.

436,85 DKK

Information Security Theory and Practice

Information Security Theory and Practice

Damiani, Ernesto

436,85 DKK

Privacy Enhancing Technologies

Privacy Enhancing Technologies

Serjantov, Andrei

436,85 DKK

Information Security Practice and Experience

Information Security Practice and Experience

Zhou, Jianying

436,85 DKK

Theory of Cryptography

Theory of Cryptography

Lindell, Yehuda

436,85 DKK

Networked Services and Applications - Engineering, Control and Management

Networked Services and Applications - Engineering, Control and Management

Knapskog, Svein J.

436,85 DKK

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection

Mazzocchi, Daniele

436,85 DKK

Cryptographic Hardware and Embedded Systems - CHES 2005

Cryptographic Hardware and Embedded Systems - CHES 2005

Sunar, Berk

436,85 DKK

Security and Privacy in Digital Rights Management

Security and Privacy in Digital Rights Management

Sander, Tomas

436,85 DKK

AI Approaches to the Complexity of Legal Systems XI-XII

AI Approaches to the Complexity of Legal Systems XI-XII

Sartor, Giovanni

619,55 DKK

Financial Cryptography

Financial Cryptography

Frankel, Yair

436,85 DKK

Fundamental Computing Forensics for Africa

Fundamental Computing Forensics for Africa

Iorliam, Aamo

436,85 DKK

Trusted Systems

Trusted Systems

Tomlinson, Allan

403,64 DKK

Recent Advances in Intrusion Detection

Recent Advances in Intrusion Detection

Trachtenberg, Ari

729,17 DKK

Digital Watermarking

Digital Watermarking

Kim, Hyoung Joong

436,85 DKK

Software Security - Theories and Systems

Software Security - Theories and Systems

Yonezaki, Naoki

436,85 DKK

Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications

Lambrinoudakis, Costas

436,85 DKK

Theory of Cryptography

Theory of Cryptography

Rabin, Tal

875,33 DKK

Information Theoretic Security

Information Theoretic Security

Fehr, Serge

436,85 DKK

Smart Spaces and Next Generation Wired/Wireless Networking

Smart Spaces and Next Generation Wired/Wireless Networking

Koucheryavy, Yevgeni

436,85 DKK