-
1
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook