GPJ

Vis mig kun

ExPDT

ExPDT

Kahmer, Martin

366,80 DKK

Datenschutz kompakt und verständlich

Datenschutz kompakt und verständlich

Witt, Bernhard C.

154,35 DKK

Grundkurs Codierung

Grundkurs Codierung

Dankmeier, Wilfried

230,54 DKK

Linguistisches Identity Matching

Linguistisches Identity Matching

Lisbach, Bertrand

59,77 DKK

Einführung in die Kryptologie

Einführung in die Kryptologie

Steffen, Bjorn

184,80 DKK

Gezahlt wie gezählt? Mit dem Bitcoin in die Welt der Kryptowährungen und ein wenig darüber hinaus

Gezahlt wie gezählt? Mit dem Bitcoin in die Welt der Kryptowährungen und ein wenig darüber hinaus

Reincke, Louis-F.

184,80 DKK

Applications and Techniques in Information Security

Applications and Techniques in Information Security

Li, Gang

436,85 DKK

Digital Watermarking

Digital Watermarking

Rosales, Hamurabi Gamboa

875,33 DKK

Multi-photon Quantum Secure Communication

Multi-photon Quantum Secure Communication

Chan, Kam Wai Clifford

1167,65 DKK

Smart Secure Systems - IoT and Analytics Perspective

Smart Secure Systems - IoT and Analytics Perspective

Narayanan, Swamynathan Sankara

436,85 DKK

Trusted Computing and Information Security

Trusted Computing and Information Security

Fu, Shaojing

436,85 DKK

Codes And Modular Forms: A Dictionary

Codes And Modular Forms: A Dictionary

Patrick Sole, Sole

546,47 DKK

Watermarking Security

Watermarking Security

Mathon, Benjamin

436,85 DKK

Domain Specific High-Level Synthesis for Cryptographic Workloads

Domain Specific High-Level Synthesis for Cryptographic Workloads

Chattopadhyay, Anupam

875,33 DKK

Trusted Computing and Information Security

Trusted Computing and Information Security

Fu, Shaojing

436,85 DKK

Codes And Modular Forms: A Dictionary

Codes And Modular Forms: A Dictionary

Patrick Sole, Sole

546,47 DKK

Smart Secure Systems - IoT and Analytics Perspective

Smart Secure Systems - IoT and Analytics Perspective

Narayanan, Swamynathan Sankara

436,85 DKK

Security in Computing and Communications

Security in Computing and Communications

Calero, Jose M. Alcaraz

436,85 DKK

Domain Specific High-Level Synthesis for Cryptographic Workloads

Domain Specific High-Level Synthesis for Cryptographic Workloads

Chattopadhyay, Anupam

875,33 DKK

Fault Tolerant Architectures for Cryptography and Hardware Security

Fault Tolerant Architectures for Cryptography and Hardware Security

Mukhopadhyay, Debdeep

1167,65 DKK

Fault Tolerant Architectures for Cryptography and Hardware Security

Fault Tolerant Architectures for Cryptography and Hardware Security

Mukhopadhyay, Debdeep

1167,65 DKK

Cryptology For Engineers: An Application-oriented Mathematical Introduction

Cryptology For Engineers: An Application-oriented Mathematical Introduction

Robert Schmied, Schmied

619,55 DKK

Animal Biometrics

Animal Biometrics

Singh, Amit Kumar

802,25 DKK

Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory

Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory

Agrawal, P. N.

875,33 DKK

Advanced Informatics for Computing Research

Advanced Informatics for Computing Research

Lingras, Pawan

436,85 DKK

Coding Theory And Cryptology

Coding Theory And Cryptology

Harald Niederreiter, Niederreiter

310,39 DKK

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Li, Meng

1167,65 DKK

Algebraic Coding Theory (Revised Edition)

Algebraic Coding Theory (Revised Edition)

Elwyn R Berlekamp, Berlekamp

473,39 DKK

Security in Computing and Communications

Security in Computing and Communications

Calero, Jose M. Alcaraz

875,33 DKK

Frontiers in Cyber Security

Frontiers in Cyber Security

Zhang, Xiaosong

436,85 DKK