GPJ

Vis mig kun

Information Systems Security

Information Systems Security

Ray, Indrakshi

436,85 DKK

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Prouff, Emmanuel

403,64 DKK

Communications and Multimedia Security

Communications and Multimedia Security

Chadwick, David W.

436,85 DKK

Coding and Cryptography

Coding and Cryptography

Zivic, Natasa

729,17 DKK

Public Key Cryptography - PKC 2008

Public Key Cryptography - PKC 2008

Cramer, Ronald

436,85 DKK

Data and Applications Security XX

Data and Applications Security XX

Liu, Peng

436,85 DKK

Algorithmic Number Theory

Algorithmic Number Theory

Kohel, David R.

436,85 DKK

Cryptographic Hardware and Embedded Systems -- CHES 2013

Cryptographic Hardware and Embedded Systems -- CHES 2013

Coron, Jean-Sebastien

436,85 DKK

Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment

Bruschi, Danilo

436,85 DKK

Public Key Cryptography -- PKC 2004

Public Key Cryptography -- PKC 2004

Zhou, Jianying

436,85 DKK

Computer Security

Computer Security

Soriano, Miguel

436,85 DKK

Unconventional Computation and Natural Computation

Unconventional Computation and Natural Computation

Verlan, Sergey

436,85 DKK

Information Security Applications

Information Security Applications

Yung, Moti

436,85 DKK

Information Hiding

Information Hiding

Aucsmith, David

436,85 DKK

Information Security Practice and Experience

Information Security Practice and Experience

Feng, Tao

436,85 DKK

Data and Applications Security XXIII

Data and Applications Security XXIII

Vaidya, Jaideep

436,85 DKK

Recent Advances in Multimedia Signal Processing and Communications

Recent Advances in Multimedia Signal Processing and Communications

Ghanbari, Mohammed

1240,73 DKK

Trustworthy Computing and Services

Trustworthy Computing and Services

Lu, Yueming

875,33 DKK

NETWORKING 2012

NETWORKING 2012

Yin, Hao

436,85 DKK

Information Security Applications

Information Security Applications

Kim, Taesoo

436,85 DKK

Cryptographic Hardware and Embedded Systems - CHES 2000

Cryptographic Hardware and Embedded Systems - CHES 2000

Paar, Christof

436,85 DKK

Topics in Cryptology -- CT-RSA 2011

Topics in Cryptology -- CT-RSA 2011

Kiayias, Aggelos

436,85 DKK

Information Security Applications

Information Security Applications

Lee, Hyung-Woo

436,85 DKK

E-Voting and Identity

E-Voting and Identity

Schoenmakers, Berry

436,85 DKK

Advances in Cryptology - CRYPTO '87

Advances in Cryptology - CRYPTO '87

Pomerance, Carl

692,63 DKK

Information Theoretic Security

Information Theoretic Security

Desmedt, Yvo

436,85 DKK

Recent Advances in Intrusion Detection

Recent Advances in Intrusion Detection

Kruegel, Christopher

436,85 DKK

Lectures on Data Security

Lectures on Data Security

Damgard, Ivan

436,85 DKK

Information Security and Privacy

Information Security and Privacy

Mu, Yi

436,85 DKK

Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications

Mitchell, Chris

403,64 DKK