Titel | Art | | ISBN-13 | Erschei- nungsjahr | andere Autoren |
Information and Communications Security: 11th International Conference, ICICS 2009 Beijing, China, December 14-17, 2009 Proceedings | Taschenbuch | | 978-3-642-11144-0 | 2010 | Sihan Qing · Guilin Wang |
Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings | " | | 978-3-319-23317-8 | 2015 | Javier Lopez |
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Notes in Computer Science , Band 5746) | " | | 978-3-642-03943-0 | 2010 | Olivier Markowitch · Angelos Bilas · Jaap-Henk Hoepman · Jean-Jacques Quisquater |
Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings | " | | 978-3-642-43115-9 | 2015 | Simone Fischer-Hübner · Elisabeth de Leeuw |
Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings | Gebunden | | 978-3-642-37281-0 | 2013 | Simone Fischer-Hübner · Elisabeth de Leeuw |
Trusted Computing: Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings | Taschenbuch | | 978-3-642-00586-2 | 2010 | Liqun Chen · Andrew Martin |
Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings | " | | 978-3-642-35370-3 | 2012 | Allan Tomlinson |
User's Guide To Cryptography And Standards | Hardcover | | 978-1-58053-530-4 | 2004 | Alex W. Dent |