Colin Boyd

C B · C. Boyd

TitelArt ISBN-13Erschei-
nungsjahr
andere Autoren
Advances in Cryptology _ ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, ... Notes in Computer Science , Band 2248)Taschenbuch 978-3-540-42987-62001
Cryptography and Coding: 5th Ima Conference, Cirencester, Uk, December 18-20, 1995, ProceedingsHardcover
978-0-387-60693-41995England) Ima Conference on Cryptography and Coding 1995 Cirencester
Cryptography and Coding: Fifth IMA Conference; Cirencester, UK, December 1995. ProceedingsTaschenbuch 978-3-540-60693-22008
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings  " 978-3-540-20176-22008Wenbo Mao
Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings  " 978-3-540-67742-02008Ed Dawson · Andrew Clark
Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings  " 978-3-540-26547-42008Juan M. Gonz?lez Nieto
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings  " 978-3-642-02619-52009
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings  " 978-3-642-39058-62013Leonie Simpson
Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings  " 978-3-540-64732-42008Ed Dawson
Protocols for Authentication and Key EstablishmentGebunden 978-3-662-58145-22020Anish Mathuria · Douglas Stebila
Protocols for Authentication and Key EstablishmentTaschenbuch 978-3-642-07716-62010
Protocols for Authentication and Key EstablishmentGebunden 978-3-540-43107-72003Anish Mathuria

Colin Bradford Jr.