نتایج جستجو
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten, 2013
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten, 2013
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of cryptography and security
van Tilborg H.C.A., 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2011
Encyclopedia of cryptography and security
Henk CAvan Tilborg, 2011
Encyclopedia of Cryptography and Security
Anne Canteaut Prof. (auth.), 2011
Encyclopedia of Cryptography and Security , 2nd Edition
Henk C. A. Van Tilborg, 2011
Encyclopedia of Cryptography and Security, 2nd Edition
Henk C. A. Van Tilborg, 2011
Cryptography and Public Key Infrastructure on the Internet
Klaus Schmeh, 2003
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Solomon W. Golomb, 2005
NET security and cryptography
Thorsteinson, Peter, 2003
Quantum communications and cryptography
Alexander V. Sergienko, 2006
Quantum Communications and Cryptography
Alexander V. Sergienko, 2005
Quantum Communications and cryptography
Sergienko A.V. (ed.), 2006
Understanding Bitcoin: Cryptography, Engineering and Economics
Pedro Franco, 2014
