Your search returned 12 results.

Not what you expected? Check for suggestions
1.
Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings / Kaoru Kurosawa (ed.).

by International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak) | Kurosawa, Kaoru.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, ©2007Other title: ASIACRYPT 2007 | 13th International Conference on the Theory and Application of Cryptology | Thirteenth International Conference on the Theory and Application of Cryptology | International Conference on the Theory and Application of Cryptology.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
2.
Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 ; proceedings / Feng Bao [and others] (eds.).

by International Conference on Cryptology and Network Security (6th : 2007 : Singapore) | Bao, Feng, Dr | International Association for Cryptologic Research.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2007Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
3.
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / Sihan Qing, Hideki Imai, Guilin Wang (eds.).

by ICICS (Conference) (9th : 2007 : Zhengzhou Shi, China) | Qing, Sihan | Imai, Hideki, 1943- | Wang, Guilin, Dr.

Source: Springer eBooksMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, ©2007Other title: ICICS 2007.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
4.
Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers / Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.).

by WISA (Workshop : Information security) (9th : 2008 : Cheju-do, Korea) | Chung, Kyo-Il | Sohn, Kiwook | Yung, Moti.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Heidelberg : Springer, ©2009Other title: WISA 2008.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
5.
Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings / Pierangela Samarati [and others] (eds.).

by ISC (Conference : Information security) (12th : 2009 : Pisa, Italy) | Samarati, Pierangela.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2009Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
6.
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings / Mitsuru Matsui (ed.).

by International Conference on the Theory and Application of Cryptology and Information Security (15th : 2009 : Tokyo, Japan) | Matsui, Mitsuru, 1961-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, ©2009Other title: ASIACRYPT 2009.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
7.
Information and communications security : 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings / Sihan Qing, Chris J. Mitchell, Guilin Wang (eds.).

by ICICS (Conference) (11th : 2009 : Beijing, China) | Qing, Sihan | Mitchell, Chris (Christopher John) | Wang, Guilin, Dr.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, ©2009Other title: ICICS 2009.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
8.
Applied cryptography and network security : 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 ; proceedings / Jianying Zhou, Moti Yung (eds.).

by ACNS (Conference) (8th : 2010 : Beijing, China) | Zhou, Jianying | Yung, Moti.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2010Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
9.
Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings / Ron Steinfeld, Philip Hawkes (eds.).

by ACISP (Conference) (15th : 2010 : Sydney, N.S.W.).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2010Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
10.
Cryptology and network security : 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings / Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.).

by International Conference on Cryptology and Network Security (9th : 2010 : Kuala Lampur, Malaysia) | Heng, Swee-Huay | Wright, Rebecca N, 1967- | Goi, Bok-Min.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2010Other title: CANS 2010.Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
11.
Information security applications : 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers / Yongwha Chung, Moti Yung (eds.).

by WISA (Workshop : Information security) (11th : 2010 : Cheju-do, Korea) | Chung, Yongwha | Yung, Moti.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2011Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .
12.
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss.

by COSADE 2012 (2012 : Darmstadt, Germany) | Schindler, Werner, 1963- | Huss, Sorin A. (Sorin Alexander).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Heidelberg ; New York : Springer, ©2012Online access: Click here to access online Availability: Items available for loan: e-Library (1). Location(s): EBook .

Powered by Koha