1 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II](Cover.cls?type=cover&isbn=9783319706979&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500268069
|
.
|
2 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III](Cover.cls?type=cover&isbn=9783319707006&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III [E-Book]
|
|
2017 |
500268070
|
.
|
3 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I](Cover.cls?type=cover&isbn=9783319706948&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500268072
|
.
|
4 |
![Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III](Cover.cls?type=cover&isbn=9783319566177&size=100) |
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III [E-Book]
|
|
2017 |
500251742
|
.
|
5 |
![Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I](Cover.cls?type=cover&isbn=9783319566207&size=100) |
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500251743
|
.
|
6 |
![Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II](Cover.cls?type=cover&isbn=9783319566146&size=100) |
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500251744
|
.
|
7 |
![Angewandte Kryptographie: Protokolle, Algorithmen und Sourcecode in C Angewandte Kryptographie: Protokolle, Algorithmen und Sourcecode in C](Cover.cls?type=cover&isbn=9783893198542&size=100) |
Angewandte Kryptographie: Protokolle, Algorithmen und Sourcecode in C [Buch]
|
Schneier, Bruce
|
1996 |
|
Regalstandort: ST 276 S359.
Lit.abteilungen: Freihand.
Verfügbar in: Hauptbibliothek.
Anzahl Exemplare: 2.
|
8 |
![Anonyme Kommunikation in Netzen Anonyme Kommunikation in Netzen](Cover.cls?type=cover&isbn=9783411155316&size=100) |
Anonyme Kommunikation in Netzen [Buch]
|
Steinacker, Angelika
|
1992 |
500021494
|
Regalstandort: ST 273 S819.
Lit.abteilungen: Freihand.
Verfügbar in: Hauptbibliothek.
Anzahl Exemplare: 1.
|
9 |
![Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings](Cover.cls?type=cover&isbn=9783319612041&size=100) |
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [E-Book]
|
|
2017 |
500255484
|
.
|
10 |
![Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319646473&size=100) |
Constructive Side-Channel Analysis and Secure Design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers [E-Book]
|
|
2017 |
500256189
|
.
|
11 |
![Cryptographic Algorithms on Reconfigurable Hardware Cryptographic Algorithms on Reconfigurable Hardware](Cover.cls?type=cover&isbn=9780387366821&size=100) |
Cryptographic Algorithms on Reconfigurable Hardware [E-Book]
|
|
2006 |
|
.
|
12 |
![Datenschutz: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie Datenschutz: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie](Cover.cls?type=cover&isbn=9783658168391&size=100) |
Datenschutz: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie [E-Book]
|
Petrlic, Ronald
|
2017 |
|
.
|
13 |
![Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss](Cover.cls?type=cover&isbn=9783642167676&size=100) |
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss [E-Book]
|
Biedermann, Alexander
|
2011 |
|
.
|
14 |
![Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit](Cover.cls?type=cover&isbn=9783540929239&size=100) |
Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit [E-Book]
|
|
2009 |
|
.
|
15 |
![Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit](Cover.cls?type=cover&isbn=9783540929222&size=100) |
Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit [Buch]
|
Meinel, Christoph
|
2009 |
|
Regalstandort: ZN 6040 M514 .
Lit.abteilungen: Freihand.
Verfügbar in: Hauptbibliothek.
Anzahl Exemplare: 2.
|
16 |
![Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319565491&size=100) |
Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers [E-Book]
|
|
2017 |
500248048
|
.
|
17 |
![International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions](Cover.cls?type=cover&isbn=9783642330186&size=100) |
International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions [E-Book]
|
Herrero, Álvaro
|
2013 |
|
.
|
18 |
![IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation](Cover.cls?type=cover&isbn=9783540248651&size=100) |
IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation [Buch]
|
Brands, Gilbert
|
2005 |
|
Regalstandort: ST 277 B819.
Lit.abteilungen: Freihand.
Verfügbar in: Hauptbibliothek.
Anzahl Exemplare: 1.
|
19 |
![IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation](Cover.cls?type=cover&isbn=9783540283065&size=100) |
IT-Sicherheitsmanagement: Protokolle, Netzwerksicherheit, Prozessorganisation [E-Book]
|
|
2005 |
|
.
|
20 |
![Kryptographische Systeme Kryptographische Systeme](Cover.cls?type=cover&isbn=9783642453335&size=100) |
Kryptographische Systeme [E-Book]
|
Baumann, Ulrike
|
2014 |
|
.
|