Tomeki

Explore Books on
cryptology and information theory data structures

1-24 of 200 Books

View Algorithmic learning in a random world By Vladimir Vovk,Alex Gammerman,Glenn Shafer
Cover of Algorithmic learning in a random world by vladimir vovk,alex gammerman,glenn shafer

Algorithmic learning in a random world

By Vladimir Vovk,Alex Gammerman,Glenn Shafer

View Engineering Secure Software and Systems By Jan Jürjens
Cover of Engineering Secure Software and Systems by jan jürjens

Engineering Secure Software and Systems

By Jan Jürjens

View Classification and data analysis By Classification Group of SIS. Meeting,Italy) Classification Group of Sis Meeting (1997 Pescara,Otto Opitz
Cover of Classification and data analysis by classification group of sis. meeting,italy) classification group of sis meeting (1997 pescara,otto opitz

Classification and data analysis

By Classification Group of SIS. Meeting,Italy) Classification Group of Sis Meeting (1997 Pescara,Otto Opitz

View Multivariate public key cryptosystems By Jintai Ding,Jason E. Gower,Dieter Schmidt
Cover of Multivariate public key cryptosystems by jintai ding,jason e. gower,dieter schmidt

Multivariate public key cryptosystems

By Jintai Ding,Jason E. Gower,Dieter Schmidt

View Advances in data science and classification By International Federation of Classification Societies. Conference,Alfredo Rizzi,Maurizio Vichi,Hans Hermann Bock
Cover of Advances in data science and classification by international federation of classification societies. conference,alfredo rizzi,maurizio vichi,hans hermann bock

Advances in data science and classification

By International Federation of Classification Societies. Conference,Alfredo Rizzi,Maurizio Vichi,Hans Hermann Bock

View Theory and Applications of Models of Computation By Manindra Agrawal
Cover of Theory and Applications of Models of Computation by manindra agrawal

Theory and Applications of Models of Computation

By Manindra Agrawal

View Network Science and Cybersecurity By Robinson E. Pino
Cover of Network Science and Cybersecurity by robinson e. pino

Network Science and Cybersecurity

By Robinson E. Pino

View Finite Sample Analysis in Quantum Estimation By Takanori Sugiyama
Cover of Finite Sample Analysis in Quantum Estimation by takanori sugiyama

Finite Sample Analysis in Quantum Estimation

By Takanori Sugiyama

View The Crossing of Heaven By Karl Gustafson
Cover of The Crossing of Heaven by karl gustafson

The Crossing of Heaven

By Karl Gustafson

View Moving Target Defense II By Sushil Jajodia
Cover of Moving Target Defense II by sushil jajodia

Moving Target Defense II

By Sushil Jajodia

View Introduction to Biometrics By Anil K. Jain
Cover of Introduction to Biometrics by anil k. jain

Introduction to Biometrics

By Anil K. Jain

View The Austin protocol compiler By Tommy M. McGuire
Cover of The Austin protocol compiler by tommy m. mcguire

The Austin protocol compiler

By Tommy M. McGuire

View Access control systems By Messaoud Benantar
Cover of Access control systems by messaoud benantar

Access control systems

By Messaoud Benantar

View Information and self-organization By H. Haken
Cover of Information and self-organization by h. haken

Information and self-organization

By H. Haken

View Foundations of Computer Security By David Salomon
Cover of Foundations of Computer Security by david salomon

Foundations of Computer Security

By David Salomon

View A classical introduction to cryptography By Serge Vaudenay
Cover of A classical introduction to cryptography by serge vaudenay

A classical introduction to cryptography

By Serge Vaudenay

View Fundamentals of Quantum Information By Dieter Heiss
Cover of Fundamentals of Quantum Information by dieter heiss

Fundamentals of Quantum Information

By Dieter Heiss

View Concurrent Zero-Knowledge By Alon Rosen
Cover of Concurrent Zero-Knowledge by alon rosen

Concurrent Zero-Knowledge

By Alon Rosen

View Advanced relational programming By Filippo Cacace,F. Cacace,G. Lamperti
Cover of Advanced relational programming by filippo cacace,f. cacace,g. lamperti

Advanced relational programming

By Filippo Cacace,F. Cacace,G. Lamperti

View Algebraic Aspects of Cryptography By A. J. Menezes,Yi-Hong Wu,R. J. Zuccherato,Neal Koblitz

Algebraic Aspects of Cryptography

Algebraic Aspects of Cryptography

By A. J. Menezes,Yi-Hong Wu,R. J. Zuccherato,Neal Koblitz

View Cryptographic Protocol By Ling Dong,Kefei Chen
Cover of Cryptographic Protocol by ling dong,kefei chen

Cryptographic Protocol

By Ling Dong,Kefei Chen

View Authentication in Insecure Environments By Sebastian Pape
Cover of Authentication in Insecure Environments by sebastian pape

Authentication in Insecure Environments

By Sebastian Pape

View Finite Fields and Applications By Dieter Jungnickel
Cover of Finite Fields and Applications by dieter jungnickel

Finite Fields and Applications

By Dieter Jungnickel

View Recent Advances in Intrusion Detection By Robin Sommer
Cover of Recent Advances in Intrusion Detection by robin sommer

Recent Advances in Intrusion Detection

By Robin Sommer