Shortcuts
 
PageMenu- Hauptmenü-
Page content

Suchergebnisse

Ihre Suche nach KRYPTOANALYSE ergibt 30 Einträge

Die Titel, die in Fettdruck angezeigt werden, haben verfügbare Medien, Titel ohne Fettdruck haben derzeit keine verfügbaren Medien.
Suchergebnisse in Tabellenform anzeigen.



- ¬Die¬ Kunst der digitalen Verteidigung [Sicherheitsstrategien, Software-Diagnosen, forensische Analysen ; für Windows, Linux und heterogene Netze] Werth, Thomas ¬Die¬ Kunst der digitalen Verteidigung [Sicherheitsstrategien, Software-Diagnosen, forensische Analysen ; für Windows, Linux und heterogene Netze]ST 276 W499 1 -
Titel: ¬Die¬ Kunst der digitalen Verteidigung [Sicherheitsstrategien, Software-Diagnosen, forensische Analysen ; für Windows, Linux und heterogene Netze]
Verfasser: Werth, Thomas
Jahr: 2009
Lit.abteilungen: Freihand.
Verfügbar in: Hauptbibliothek.
- Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 2 -
Titel: Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I
Verfasser:
Jahr: 2017
.
- Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings Herrero, Álvaro Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings 3 -
Titel: Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings
Verfasser: Herrero, Álvaro
Jahr: 2009
.
- Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) Herrero, Álvaro Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) 4 -
Titel: Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)
Verfasser: Herrero, Álvaro
Jahr: 2010
.
- Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II 5 -
Titel: Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
Verfasser:
Jahr: 2017
.
- Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers 6 -
Titel: Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers
Verfasser:
Jahr: 2017
.
- Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings 7 -
Titel: Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings
Verfasser:
Jahr: 2017
.
- Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss Biedermann, Alexander Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss 8 -
Titel: Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Verfasser: Biedermann, Alexander
Jahr: 2011
.
- Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers 9 -
Titel: Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
Verfasser:
Jahr: 2017
.
- Feistel Ciphers: Security Proofs and Cryptanalysis Nachef, Valerie Feistel Ciphers: Security Proofs and Cryptanalysis 10 -
Titel: Feistel Ciphers: Security Proofs and Cryptanalysis
Verfasser: Nachef, Valerie
Jahr: 2017
.




Schnellsuche