Results
|
501.
|
|
Image from Amazon.com
|
|
|
502.
|
|
Image from Amazon.com
|
|
|
503.
|
|
Image from Amazon.com
|
|
|
504.
|
|
Image from Amazon.com
|
|
|
505.
|
|
Image from Amazon.com
|
Security Protocols [electronic resource] : 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. by Series: Lecture Notes in Computer Science ; 4631Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
506.
|
|
Image from Amazon.com
|
|
|
507.
|
|
Image from Amazon.com
|
Selected Areas in Cryptography [electronic resource] : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers / edited by Carlisle Adams, Ali Miri, Michael Wiener. by Series: Lecture Notes in Computer Science ; 4876Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
508.
|
|
Image from Amazon.com
|
Financial Cryptography and Data Security [electronic resource] : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers / edited by Sven Dietrich, Rachna Dhamija. by Series: Lecture Notes in Computer Science ; 4886Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
509.
|
|
Image from Amazon.com
|
Information Hiding [electronic resource] : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers / edited by Teddy Furon, François Cayre, Gwenaël Doërr, Patrick Bas. by Series: Lecture Notes in Computer Science ; 4567Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
510.
|
|
Image from Amazon.com
|
|
|
511.
|
|
Image from Amazon.com
|
|
|
512.
|
|
Image from Amazon.com
|
Information Security Applications [electronic resource] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / edited by Sehun Kim, Moti Yung, Hyung-Woo Lee. by Series: Lecture Notes in Computer Science ; 4867Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007
In:
Springer eBooks
Availability: No items available.
|
|
513.
|
|
Image from Amazon.com
|
|
|
514.
|
|
Image from Amazon.com
|
Trust Management II [electronic resource] : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway / edited by Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen. by Series: IFIP – The International Federation for Information Processing ; 263Publisher: Boston, MA : Springer US, 2008
In:
Springer eBooks
Availability: No items available.
|
|
515.
|
|
Image from Amazon.com
|
|
|
516.
|
|
Image from Amazon.com
|
|
|
517.
|
|
Image from Amazon.com
|
|
|
518.
|
|
Image from Amazon.com
|
|
|
519.
|
|
Image from Amazon.com
|
|
|
520.
|
|
Image from Amazon.com
|
|