Tomeki

Explore Books on
kryptosystem

1-24 of 36 Books

View Churchill's secret war By Robin Denniston
Cover of Churchill's secret war by robin denniston

Churchill's secret war

By Robin Denniston

View Grid computing security By Anirban Chakrabarti
Cover of Grid computing security by anirban chakrabarti

Grid computing security

By Anirban Chakrabarti

View Security in pervasive computing By International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)
Cover of Security in pervasive computing by international conference on security in pervasive computing (2nd 2005 boppard, germany)

Security in pervasive computing

By International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)

View Contemporary cryptology By Advanced Course on Contemporary Cryptology (2004 Universitat politècnica de Catalunya)
Cover of Contemporary cryptology by advanced course on contemporary cryptology (2004 universitat politècnica de catalunya)

Contemporary cryptology

By Advanced Course on Contemporary Cryptology (2004 Universitat politècnica de Catalunya)

View Information security and cryptology--ICISC'99 By ICISC'99 (1999 Seoul, Korea)
Cover of Information security and cryptology--ICISC'99 by icisc'99 (1999 seoul, korea)

Information security and cryptology--ICISC'99

By ICISC'99 (1999 Seoul, Korea)

View Secure data management By SDM 2005 (2005 Trondheim, Norway)
Cover of Secure data management by sdm 2005 (2005 trondheim, norway)

Secure data management

By SDM 2005 (2005 Trondheim, Norway)

View Verschlüsselungsalgorithmen By Gilbert Brands
Cover of Verschlüsselungsalgorithmen by gilbert brands

Verschlüsselungsalgorithmen

By Gilbert Brands

View Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition) By Christoph Meinel,Harald Sack
Cover of Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition) by christoph meinel,harald sack

Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition)

By Christoph Meinel,Harald Sack

View Information and Communications Security By ICICS <12, 2010, Barcelona>
Cover of Information and Communications Security by icics <12, 2010, barcelona>

Information and Communications Security

By ICICS <12, 2010, Barcelona>

View Cryptographic applications of analytic number theory By Igor E. Shparlinski
Cover of Cryptographic applications of analytic number theory by igor e. shparlinski

Cryptographic applications of analytic number theory

By Igor E. Shparlinski

View Information security and privacy By ACISP 2010 (2010 Sydney, N.S.W.)
Cover of Information security and privacy by acisp 2010 (2010 sydney, n.s.w.)

Information security and privacy

By ACISP 2010 (2010 Sydney, N.S.W.)

View Communications and multimedia security By IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (11th 2010 Linz, Austria)
Cover of Communications and multimedia security by ifip tc 6/tc 11 international conference on communications and multimedia security (11th 2010 linz, austria)

Communications and multimedia security

By IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (11th 2010 Linz, Austria)

View Information and communications security By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
Cover of Information and communications security by international conference on information and communications security (9th 2007 zhengzhou shi, china)

Information and communications security

By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

View Computer Security – ESORICS 2009 By Michael Backes
Cover of Computer Security – ESORICS 2009 by michael backes

Computer Security – ESORICS 2009

By Michael Backes

View Web Information Systems and Mining By Fu Lee Wang
Cover of Web Information Systems and Mining by fu lee wang

Web Information Systems and Mining

By Fu Lee Wang

View Cryptology and network security By International Conference on Cryptology and Network Security (6th 2007 Singapore)
Cover of Cryptology and network security by international conference on cryptology and network security (6th 2007 singapore)

Cryptology and network security

By International Conference on Cryptology and Network Security (6th 2007 Singapore)

View Advances in information security and its application By Jong Hyuk Park
Cover of Advances in information security and its application by jong hyuk park

Advances in information security and its application

By Jong Hyuk Park

View Advances in information security and its application By Jong Hyuk Park,Jong Hyuk Park
Cover of Advances in information security and its application by jong hyuk park,jong hyuk park

Advances in information security and its application

By Jong Hyuk Park,Jong Hyuk Park

View Provable security By ProvSec 2009 (2009 Guangzhou, China)
Cover of Provable security by provsec 2009 (2009 guangzhou, china)

Provable security

By ProvSec 2009 (2009 Guangzhou, China)

View Information Security Applications By Hutchison, David - undifferentiated
Cover of Information Security Applications by hutchison, david - undifferentiated

Information Security Applications

By Hutchison, David - undifferentiated

View Advances in Cryptology - EUROCRYPT 2009 By Hutchison, David - undifferentiated
Cover of Advances in Cryptology - EUROCRYPT 2009 by hutchison, david - undifferentiated

Advances in Cryptology - EUROCRYPT 2009

By Hutchison, David - undifferentiated

View Applied cryptography and network security By ACNS 2009 (2009 Rocquencourt, Yvelines, France)
Cover of Applied cryptography and network security by acns 2009 (2009 rocquencourt, yvelines, france)

Applied cryptography and network security

By ACNS 2009 (2009 Rocquencourt, Yvelines, France)

View Applied cryptography and network security By ACNS 2010 (2010 Beijing, China)
Cover of Applied cryptography and network security by acns 2010 (2010 beijing, china)

Applied cryptography and network security

By ACNS 2010 (2010 Beijing, China)

View Foundations of Security Analysis and Design V By Alessandro Aldini
Cover of Foundations of Security Analysis and Design V by alessandro aldini

Foundations of Security Analysis and Design V

By Alessandro Aldini