GPJ

Vis mig kun

Information Security and Assurance

Information Security and Assurance

Xiao, Yang

436,85 DKK

Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications

Pernul, Gunther

436,85 DKK

Privacy and Identity Management for Life

Privacy and Identity Management for Life

Rannenberg, Kai

1240,73 DKK

Selected Areas in Cryptography

Selected Areas in Cryptography

Wiener, Michael

436,85 DKK

Cyberspace Safety and Security

Cyberspace Safety and Security

Zhou, Wanlei

436,85 DKK

Verschlüsselungsalgorithmen

Verschlüsselungsalgorithmen

Brands, Gilbert

322,59 DKK

Information Hiding

Information Hiding

Ghosal, Dipak

403,64 DKK

Security Protocols XVIII

Security Protocols XVIII

Malcolm, James

403,64 DKK

Information Security and Cryptology - ICISC 2009

Information Security and Cryptology - ICISC 2009

Hong, Seokhie

436,85 DKK

Engineering Secure Software and Systems

Engineering Secure Software and Systems

Zannone, Nicola

436,85 DKK

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Rubin, Avi

436,85 DKK

Fundamentals of Digital Forensics

Fundamentals of Digital Forensics

Kavrestad, Joakim

310,39 DKK

Computer Security - ESORICS 2004

Computer Security - ESORICS 2004

Molva, Refik

436,85 DKK

Privacy and Identity Management for Life

Privacy and Identity Management for Life

Zhang, Ge

436,85 DKK

Critical Information  Infrastructures Security

Critical Information Infrastructures Security

Bloomfield, Robin

436,85 DKK

Applied Cryptography and Network Security

Applied Cryptography and Network Security

Yung, Moti

436,85 DKK

Cryptographic Hardware and Embedded Systems - CHES 2002

Cryptographic Hardware and Embedded Systems - CHES 2002

Paar, Christof

436,85 DKK

Future Network Systems and Security

Future Network Systems and Security

Zhou, Wei

436,85 DKK

Advances in Information Technology

Advances in Information Technology

Vanijja, Vajirasak

436,85 DKK

Information and Communications Security

Information and Communications Security

Zhou, Jianying

436,85 DKK

Data and Applications Security and Privacy XXVI

Data and Applications Security and Privacy XXVI

Garcia-Alfaro, Joaquin

436,85 DKK

Trusted Computing

Trusted Computing

Martin, Andrew

436,85 DKK

Public Key Cryptography -- PKC 2011

Public Key Cryptography -- PKC 2011

Nicolosi, Antonio

436,85 DKK

Principles of Security and Trust

Principles of Security and Trust

Ryan, Mark

436,85 DKK

Ad Hoc Networks

Ad Hoc Networks

Helmy, Ahmed

436,85 DKK

Security Protocols

Security Protocols

Roe, Michael

436,85 DKK

Information Systems Security

Information Systems Security

Goswami, Diganta

436,85 DKK

Information Hiding

Information Hiding

Moskowitz, Ira S.

436,85 DKK

Cryptographic Hardware and Embedded Systems -- CHES 2003

Cryptographic Hardware and Embedded Systems -- CHES 2003

Paar, Christof

436,85 DKK

Network and System Security

Network and System Security

Mu, Yi

436,85 DKK