Search Results - "Cryptology and information security series ;"
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 12
- Radio frequency identification systems 10
- Computer security 4
- Cryptography 4
- Ciphers 2
- Computer crimes 2
- Cyberterrorism 2
- Data encryption (Computer science) 2
- Detectors 2
- Electronic digital computers 2
- Information warfare 2
- Management 2
- Public key cryptography 2
- Radio 2
- Sensor networks 2
- Ubiquitous computing 2
-
1
Wireless sensor network security
Published 2008“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Identity-based cryptography
Published 2009“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
The virtual battlefield perspectives on cyber warfare /
Published 2009“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Radio frequency identification system security RFIDsec'10 Asia workshop proceedings /
Published 2010“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Formal models and techniques for analyzing security protocols
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Radio frequency identification system security RFIDsec'11 Asia Workshop proceedings /
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Advanced linear cryptanalysis of block and stream ciphers
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing /
Published 2012“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Secure multi-party computation
Published 2013“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Radio frequency identification system security : RFIDsec'13 Asia workshop proceedings /
Published 2013“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Radio frequency identification system security : RFIDsec'14 Asia Workshop proceedings /
Published 2014“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
The virtual battlefield perspectives on cyber warfare /
Published 2009“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Radio frequency identification system security RFIDsec'10 Asia workshop proceedings /
Published 2010“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Formal models and techniques for analyzing security protocols
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Radio frequency identification system security RFIDsec'11 Asia Workshop proceedings /
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
16
Advanced linear cryptanalysis of block and stream ciphers
Published 2011“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing /
Published 2012“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Secure multi-party computation
Published 2013“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Radio frequency identification system security : RFIDsec'13 Asia workshop proceedings /
Published 2013“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Radio frequency identification system security : RFIDsec'14 Asia Workshop proceedings /
Published 2014“…Cryptology and information security series ;…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook