Results
|
101.
|
|
Image from Amazon.com
|
Financial Cryptography and Data Security [electronic resource] : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers / edited by Sven Dietrich, Rachna Dhamija. by Series: Lecture Notes in Computer Science ; 4886Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
102.
|
|
Image from Amazon.com
|
Information Security Applications [electronic resource] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / edited by Sehun Kim, Moti Yung, Hyung-Woo Lee. by Series: Lecture Notes in Computer Science ; 4867Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
103.
|
|
Image from Amazon.com
|
|
|
104.
|
|
Image from Amazon.com
|
Trust Management II [electronic resource] : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway / edited by Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen. by Series: IFIP – The International Federation for Information Processing ; 263Publisher: Boston, MA : Springer US, 2008
In:
Springer eBooks
Availability: No items available.
|
|
105.
|
|
Image from Amazon.com
|
|
|
106.
|
|
Image from Amazon.com
|
|
|
107.
|
|
Image from Amazon.com
|
|
|
108.
|
|
Image from Amazon.com
|
|
|
109.
|
|
Image from Amazon.com
|
Applied Cryptography and Network Security [electronic resource] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings / edited by Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung. by Series: Lecture Notes in Computer Science ; 5037Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
110.
|
|
Image from Amazon.com
|
|
|
111.
|
|
Image from Amazon.com
|
Ubiquitous Intelligence and Computing [electronic resource] : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence T. Yang, Jianhua Ma. by Series: Lecture Notes in Computer Science ; 5061Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
112.
|
|
Image from Amazon.com
|
|
|
113.
|
|
Image from Amazon.com
|
|
|
114.
|
|
Image from Amazon.com
|
|
|
115.
|
|
Image from Amazon.com
|
Privacy, Security, and Trust in KDD [electronic resource] : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers / edited by Francesco Bonchi, Elena Ferrari, Bradley Malin, Yücel Saygin. by Series: Lecture Notes in Computer Science ; 4890Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
116.
|
|
Image from Amazon.com
|
|
|
117.
|
|
Image from Amazon.com
|
Information Security and Cryptology [electronic resource] : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers / edited by Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu. by Series: Lecture Notes in Computer Science ; 4990Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
118.
|
|
Image from Amazon.com
|
|
|
119.
|
|
Image from Amazon.com
|
|
|
120.
|
|
Image from Amazon.com
|
|