Titel | Art | | ISBN-13 | Erschei- nungsjahr | andere Autoren |
Advances in Cryptology - ASIACRYPT '94: 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - ... | Taschenbuch | | 978-3-540-59339-3 | 1995 | Reihanah Safavi-Naini |
Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990 | " | | 978-3-540-53000-8 | 2008 | Jennifer Seberry |
Cryptography: An Introduction to Computer Security | Hardcover | | 978-0-13-194986-7 | 1989 | " |
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings | Taschenbuch | | 978-3-642-35403-8 | 2012 | Ahmad-Reza Sadeghi · Mark Manulis |
Design of Hashing Algorithms | " | | 978-3-540-57500-9 | 2008 | Babak Sadeghiyan |
Design of Hashing Algorithms | Paperback | | 978-0-387-57500-1 | 1993 | " |
Fundamentals of Computer Security | Taschenbuch | | 978-3-642-07713-5 | 2010 |
Fundamentals Of Computer Security | Paperback | | 978-81-8128-916-2 | 2008 |
Fundamentals of Computer Security | Gebunden | | 978-3-540-43101-5 | 2003 | Thomas Hardjono · Jennifer Seberry |
Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings | Taschenbuch | | 978-3-540-65756-9 | 2008 | Jennifer Seberry · Rei Safavi-Naini |
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings | " | | 978-3-540-22379-5 | 2008 | Huaxiong Wang · Vijay Varadharajan |
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings | " | | 978-3-540-73457-4 | 2007 |
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I | " | | 978-3-319-60054-3 | 2017 | Suriadi Suriadi |
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II | " | | 978-3-319-59869-7 | 2017 | " |
Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings | " | | 978-3-540-61991-8 | 2008 | Jennifer Seberry |
Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings | " | | 978-3-540-63232-0 | 2008 | Yi Mu · Vijav Varadharajan |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings | " | | 978-3-540-41416-2 | 2008 | Eiji Okamoto · Jennifer Seberry |
Number-Theoretic Methods in Cryptology: First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers | " | | 978-3-319-76619-5 | 2018 | Jerzy Kaczorowski · Jacek Pomykala |
Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings | " | | 978-3-642-04641-4 | 2010 |
Teoria bezpieczenstwa systemów komputerowych | " | | 978-83-7361-678-3 | |
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings | " | | 978-3-642-11924-8 | 2010 |