Tomeki

Explore Books on
sicherheitsprotokoll

1-23 of 23 Books

View Locally decodable codes and private information retrieval schemes By Sergey Yekhanin
Cover of Locally decodable codes and private information retrieval schemes by sergey yekhanin

Locally decodable codes and private information retrieval schemes

By Sergey Yekhanin

View Security in pervasive computing By International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)
Cover of Security in pervasive computing by international conference on security in pervasive computing (2nd 2005 boppard, germany)

Security in pervasive computing

By International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)

View Cryptography and coding By IMA International Conference (12th 2009 Cirencester, England)
Cover of Cryptography and coding by ima international conference (12th 2009 cirencester, england)

Cryptography and coding

By IMA International Conference (12th 2009 Cirencester, England)

View Information security and privacy By ACISP 2010 (2010 Sydney, N.S.W.)
Cover of Information security and privacy by acisp 2010 (2010 sydney, n.s.w.)

Information security and privacy

By ACISP 2010 (2010 Sydney, N.S.W.)

View Information and communications security By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
Cover of Information and communications security by international conference on information and communications security (9th 2007 zhengzhou shi, china)

Information and communications security

By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

View Computer Security – ESORICS 2009 By Michael Backes
Cover of Computer Security – ESORICS 2009 by michael backes

Computer Security – ESORICS 2009

By Michael Backes

View Advances in information security and its application By Jong Hyuk Park
Cover of Advances in information security and its application by jong hyuk park

Advances in information security and its application

By Jong Hyuk Park

View Advances in information security and its application By Jong Hyuk Park,Jong Hyuk Park
Cover of Advances in information security and its application by jong hyuk park,jong hyuk park

Advances in information security and its application

By Jong Hyuk Park,Jong Hyuk Park

View Provable security By ProvSec 2009 (2009 Guangzhou, China)
Cover of Provable security by provsec 2009 (2009 guangzhou, china)

Provable security

By ProvSec 2009 (2009 Guangzhou, China)

View Formal To Practical Security Papers Issued From The 20052008 Frenchjapanese Collaboration By Mitsuhiro Okada
Cover of Formal To Practical Security Papers Issued From The 20052008 Frenchjapanese Collaboration by mitsuhiro okada

Formal To Practical Security Papers Issued From The 20052008 Frenchjapanese Collaboration

By Mitsuhiro Okada

View Applied cryptography and network security By ACNS 2009 (2009 Rocquencourt, Yvelines, France)
Cover of Applied cryptography and network security by acns 2009 (2009 rocquencourt, yvelines, france)

Applied cryptography and network security

By ACNS 2009 (2009 Rocquencourt, Yvelines, France)

View Digital watermarking By IWDW 2009 (2009 Guildford, England)
Cover of Digital watermarking by iwdw 2009 (2009 guildford, england)

Digital watermarking

By IWDW 2009 (2009 Guildford, England)

View Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings By Guilin Wang
Cover of Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings by guilin wang

Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings

By Guilin Wang

View Efficient Secure Twoparty Protocols Techniques And Constructions By Yehuda Lindell
Cover of Efficient Secure Twoparty Protocols Techniques And Constructions by yehuda lindell

Efficient Secure Twoparty Protocols Techniques And Constructions

By Yehuda Lindell

View Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings By Noboru Kunihiro
Cover of Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings by noboru kunihiro

Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings

By Noboru Kunihiro

View Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers By Hyoung-Joong Kim
Cover of Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers by hyoung-joong kim

Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers

By Hyoung-Joong Kim

View Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers By Christos Kaklamanis
Cover of Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers by christos kaklamanis

Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers

By Christos Kaklamanis

View Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers By Souhwan Jung
Cover of Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers by souhwan jung

Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers

By Souhwan Jung

View Advances in Cryptology – ASIACRYPT 2009 By Mitsuru Matsui
Cover of Advances in Cryptology – ASIACRYPT 2009 by mitsuru matsui

Advances in Cryptology – ASIACRYPT 2009

By Mitsuru Matsui

View Information Security and Privacy By Hutchison, David - undifferentiated
Cover of Information Security and Privacy by hutchison, david - undifferentiated

Information Security and Privacy

By Hutchison, David - undifferentiated

View Information Security By Pierangela Samarati
Cover of Information Security by pierangela samarati

Information Security

By Pierangela Samarati

View Trustworthy global computing By TGC 2006 (2006 Lucca, Italy)
Cover of Trustworthy global computing by tgc 2006 (2006 lucca, italy)

Trustworthy global computing

By TGC 2006 (2006 Lucca, Italy)

View Advances in information and computer security By International Workshop on Security (4th 2009 Toyama-shi, Japan)
Cover of Advances in information and computer security by international workshop on security (4th 2009 toyama-shi, japan)

Advances in information and computer security

By International Workshop on Security (4th 2009 Toyama-shi, Japan)