Results
|
1661.
|
|
Image from Amazon.com
|
|
|
1662.
|
|
Image from Amazon.com
|
|
|
1663.
|
|
Image from Amazon.com
|
Cryptology and Network Security [electronic resource] : 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings / edited by Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing. by Series: Lecture Notes in Computer Science ; 4856Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1664.
|
|
Image from Amazon.com
|
|
|
1665.
|
|
Image from Amazon.com
|
|
|
1666.
|
|
Image from Amazon.com
|
|
|
1667.
|
|
Image from Amazon.com
|
|
|
1668.
|
|
Image from Amazon.com
|
Security Protocols [electronic resource] : 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. by Series: Lecture Notes in Computer Science ; 4631Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1669.
|
|
Image from Amazon.com
|
|
|
1670.
|
|
Image from Amazon.com
|
Selected Areas in Cryptography [electronic resource] : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers / edited by Carlisle Adams, Ali Miri, Michael Wiener. by Series: Lecture Notes in Computer Science ; 4876Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1671.
|
|
Image from Amazon.com
|
Financial Cryptography and Data Security [electronic resource] : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers / edited by Sven Dietrich, Rachna Dhamija. by Series: Lecture Notes in Computer Science ; 4886Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1672.
|
|
Image from Amazon.com
|
Information Hiding [electronic resource] : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers / edited by Teddy Furon, François Cayre, Gwenaël Doërr, Patrick Bas. by Series: Lecture Notes in Computer Science ; 4567Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1673.
|
|
Image from Amazon.com
|
|
|
1674.
|
|
Image from Amazon.com
|
|
|
1675.
|
|
Image from Amazon.com
|
Information Security Applications [electronic resource] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / edited by Sehun Kim, Moti Yung, Hyung-Woo Lee. by Series: Lecture Notes in Computer Science ; 4867Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
1676.
|
|
Image from Amazon.com
|
|
|
1677.
|
|
Image from Amazon.com
|
Trust Management II [electronic resource] : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway / edited by Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen. by Series: IFIP – The International Federation for Information Processing ; 263Publisher: Boston, MA : Springer US, 2008
In:
Springer eBooks
Availability: No items available.
|
|
1678.
|
|
Image from Amazon.com
|
|
|
1679.
|
|
Image from Amazon.com
|
|
|
1680.
|
|
Image from Amazon.com
|
|