GPJ

Vis mig kun

Deep Reinforcement Learning

Deep Reinforcement Learning

Sewak, Mohit

1240,73 DKK

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Li, Meng

1167,65 DKK

Algebraic Coding Theory (Revised Edition)

Algebraic Coding Theory (Revised Edition)

Elwyn R Berlekamp, Berlekamp

473,39 DKK

Advances In Coding Theory And Cryptography

Advances In Coding Theory And Cryptography

D Joyner, Joyner

403,64 DKK

Ubiquitous Security

Ubiquitous Security

Crispo, Bruno

656,09 DKK

Frontiers in Cyber Security

Frontiers in Cyber Security

Zhang, Xiaosong

436,85 DKK

Ubiquitous Security

Ubiquitous Security

Crispo, Bruno

656,09 DKK

Security in Computing and Communications

Security in Computing and Communications

Calero, Jose M. Alcaraz

875,33 DKK

Security and Privacy

Security and Privacy

Debnath, Sumit Kumar

875,33 DKK

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Zhang, Leo Yu

436,85 DKK

Security and Privacy in Social Networks and Big Data

Security and Privacy in Social Networks and Big Data

Li, Jin

436,85 DKK

Deep Reinforcement Learning

Deep Reinforcement Learning

Sewak, Mohit

1240,73 DKK

Security and Privacy

Security and Privacy

Debnath, Sumit Kumar

875,33 DKK

Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware

Verbauwhede, Ingrid

436,85 DKK

Blockchain: Empowering Secure Data Sharing

Blockchain: Empowering Secure Data Sharing

Xu, Ke

875,33 DKK

Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware

Verbauwhede, Ingrid

436,85 DKK

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT

Zhang, Leo Yu

436,85 DKK

Applications and Techniques in Information Security

Applications and Techniques in Information Security

Li, Gang

436,85 DKK

Improving Image Quality in Visual Cryptography

Improving Image Quality in Visual Cryptography

Hua, Guang

875,33 DKK

Blockchain: Empowering Secure Data Sharing

Blockchain: Empowering Secure Data Sharing

Xu, Ke

875,33 DKK

Improving Image Quality in Visual Cryptography

Improving Image Quality in Visual Cryptography

Hua, Guang

875,33 DKK

Designs From Linear Codes

Designs From Linear Codes

Cunsheng Ding, Ding

1094,57 DKK

Applications and Techniques in Information Security

Applications and Techniques in Information Security

Li, Gang

436,85 DKK

Quantum Algorithms for Cryptographically Significant Boolean Functions

Quantum Algorithms for Cryptographically Significant Boolean Functions

Maitra, Subhamoy

509,93 DKK

Artificial Intelligence and Security

Artificial Intelligence and Security

Bertino, Elisa

875,33 DKK

Artificial Intelligence and Security

Artificial Intelligence and Security

Bertino, Elisa

875,33 DKK

Security in Computing and Communications

Security in Computing and Communications

Fan, Chun-I

436,85 DKK

Machine Learning Approaches in Cyber Security Analytics

Machine Learning Approaches in Cyber Security Analytics

Emmanuel, Sabu

1167,65 DKK

Applications and Techniques in Information Security

Applications and Techniques in Information Security

Li, Gang

436,85 DKK

Secure Knowledge Management In Artificial Intelligence Era

Secure Knowledge Management In Artificial Intelligence Era

Jadliwala, Murtuza

436,85 DKK