نتایج جستجو
Computer Viruses and Malware (Advances in Information Security)
John Aycock, 2006
Computer Viruses and Malware (Advances in Information Security)
John Aycock, 2006
Advances in Computer Science - ASIAN 2009. Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
Jean Goubault-Larrecq (auth.), Anupam Datta (eds.), 2009
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings
Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
Afghanistan Security
Lawrence B. Peabody, 2009
A Military History of the Ottomans: From Osman to Ataturk (Praeger Security International)
Mesut Uyar, Edward J Erickson, 2009
Safety and Security Review for the Process Industries. Application of HAZOP, PHA, What-IF and SVA Reviews
Dennis P. Nolan (Auth.), 2011
Sensors for Environment, Health and Security: Advanced Materials and Technologies
Alexander Gaskov, Marina Rumyantseva (auth.), Marie-Isabelle Baraton (eds.), 2009
Access Control Systems: Security, Identity Management and Trust Models
Dr. Messaoud Benantar (auth.), 2006
