کتاب های Anna David

Natural language generation systems
David D. McDonald, Leonard Bolc, 1988
Advances in Cryptology — CRYPTO’ 89 Proceedings
David Kahn (auth.), Gilles Brassard (eds.), 1990
Advances in Cryptology — CRYPTO’ 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings
Jurjen N. E. Bos, David Chaum (auth.), Ernest F. Brickell (eds.), 1993
Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings
Jean-Sébastien Coron, David Naccache, Julien P. Stern (auth.), Michael Wiener (eds.), 1999
Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings
James L. Massey (auth.), David Chaum, Wyn L. Price (eds.), 1988
Advances in Cryptology: Proceedings of CRYPTO 84
S C Serpell, C B Brookson, B L Clark (auth.), George Robert Blakley, David Chaum (eds.), 1985
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2010
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings
Shay Gueron, Jean-Pierre Seifert (auth.), Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert (eds.), 2006
Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings
Kouichi Sakurai, Tsuyoshi Takagi (auth.), David Naccache, Pascal Paillier (eds.), 2002
Some Applications of coding theory in cryptography
David Kahn, 2000
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings
Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson (auth.), Joe Kilian (eds.), 2005
Advanced ANSI SQL Data Modeling and Structure Processing
Michael M. David, 1999
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, 2006
Copy, Rip, Burn: The Politics of Copyleft and Open Source
David Berry, 2008
Enterprise Risk Management Models
David L. Olson, Desheng Wu, 2010