نتایج جستجو
Hydrogen Materials Science and Chemistry of Carbon Nanomaterials (NATO Security for Science Series A: Chemistry and Biology)
T. Nejat Veziroglu, Svetlana Yu. Zaginaichenko, Dmitry V. Schur, Bogdan Baranowski, Anatoliy P. Shpak, Valeriy V. Skorokhod, Ayfer Kale, 2007
A Guide to Computer Network Security
Joseph Migga Kizza (auth.), Joseph Migga Kizza (eds.), 2009
A Guide to Computer Network Security
Joseph Migga Kizza (auth.), Joseph Migga Kizza (eds.), 2009
Advances in Computer Science - ASIAN 2009. Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
Jean Goubault-Larrecq (auth.), Anupam Datta (eds.), 2009
Advances in Computer Science – ASIAN 2007. Computer and Network Security: 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
Andrei Sabelfeld (auth.), Iliano Cervesato (eds.), 2007
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Boolean Functions in Cryptology and Information Security
O.A. Logachev, 2008
Cryptographic Security Architecture: Design and Verification
Peter Gutmann, 2003
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.), 2007
Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai (auth.), Pil Joong Lee, Jung Hee Cheon (eds.), 2009
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Chuck Easttom, 2015
