Josef Pieprzyk

J. P. · Josef Pawel Pieprzyk · Joseph Poprzeczny · Józef Pieprzyk

TitelArt ISBN-13Erschei-
nungsjahr
andere Autoren
Advances in Cryptology - ASIACRYPT '94: 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - ...Taschenbuch
978-3-540-59339-31995Reihanah Safavi-Naini
Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990  "
978-3-540-53000-82008Jennifer Seberry
Cryptography: An Introduction to Computer SecurityHardcover
978-0-13-194986-71989  "
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. ProceedingsTaschenbuch
978-3-642-35403-82012Ahmad-Reza Sadeghi · Mark Manulis
Design of Hashing Algorithms  "
978-3-540-57500-92008Babak Sadeghiyan
Design of Hashing AlgorithmsPaperback
978-0-387-57500-11993  "
Fundamentals of Computer SecurityTaschenbuch
978-3-642-07713-52010
Fundamentals Of Computer SecurityPaperback 978-81-8128-916-22008
Fundamentals of Computer SecurityGebunden
978-3-540-43101-52003Thomas Hardjono · Jennifer Seberry
Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, ProceedingsTaschenbuch
978-3-540-65756-92008Jennifer Seberry · Rei Safavi-Naini
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings  "
978-3-540-22379-52008Huaxiong Wang · Vijay Varadharajan
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings  "
978-3-540-73457-42007
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I  "
978-3-319-60054-32017Suriadi Suriadi
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II  "
978-3-319-59869-72017  "
Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings  "
978-3-540-61991-82008Jennifer Seberry
Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings  "
978-3-540-63232-02008Yi Mu · Vijav Varadharajan
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings  "
978-3-540-41416-22008Eiji Okamoto · Jennifer Seberry
Number-Theoretic Methods in Cryptology: First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers  "
978-3-319-76619-52018Jerzy Kaczorowski · Jacek Pomykala
Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings  "
978-3-642-04641-42010
Teoria bezpieczenstwa systemów komputerowych  " 978-83-7361-678-3
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings  "
978-3-642-11924-82010

Helion · Prentice Hall · Springer

 

Josef Pies