Shortcuts
 
PageMenu- Hauptmenü-
Page content
 

Suchergebnisse

Ihre Suche nach KRYPTOANALYSE ergibt 30 Einträge

Suchergebnisseite: .   1 NNN 2 .   . zum Satzanfang Nächste .   . Seite: 1 von 2
Die Titel, die in Fettdruck angezeigt werden, haben verfügbare Medien, Titel ohne Fettdruck haben derzeit keine verfügbaren Medien.

Suchergebnisse einschränken

Medientyp:
LitAbtlg:
Sprache:
Standort:
Suchergebnisse in Regalansicht anzeigen.
Suchergebnisse
Nr. Cover Titel Verfasser Jahr Beschreibung Exemplarinformation
1 Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500268069500268069 E-Book URL Exists Catalogue Record .
2 Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500268070500268070 E-Book URL Exists Catalogue Record .
3 Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500268072500268072 E-Book URL Exists Catalogue Record .
4 Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings [E-Book] Herrero, Álvaro 2009 E-Book URL Exists Catalogue Record .
5 Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) [E-Book] Herrero, Álvaro 2010 E-Book URL Exists Catalogue Record .
6 Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500256220500256220 E-Book URL Exists Catalogue Record .
7 Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500256222500256222 E-Book URL Exists Catalogue Record .
8 Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500268079500268079 E-Book URL Exists Catalogue Record .
9 Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500258191500258191 E-Book URL Exists Catalogue Record .
10 Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss [E-Book] Biedermann, Alexander 2011 E-Book URL Exists Catalogue Record .
11 Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500245307500245307 E-Book URL Exists Catalogue Record .
12 Feistel Ciphers: Security Proofs and Cryptanalysis Feistel Ciphers: Security Proofs and Cryptanalysis [E-Book] Nachef, Valerie 2017 E-Book URL Exists Catalogue Record .
13 Handbook of Information and Communication Security Handbook of Information and Communication Security [E-Book] Stavroulakis, Peter 2010 E-Book URL Exists Catalogue Record .
14 Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers [E-Book]   2017 Reihenverknüpfung anzeigen für Katalogsatz 500248048500248048 E-Book URL Exists Catalogue Record .
15 Intelligence and Security Informatics: Techniques and Applications Intelligence and Security Informatics: Techniques and Applications [E-Book]   2008 E-Book URL Exists Catalogue Record .
16 Intelligent Networking, Collaborative Systems and Applications Intelligent Networking, Collaborative Systems and Applications [E-Book] Caballé, Santi 2011 E-Book URL Exists Catalogue Record .
17 International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions [E-Book] Herrero, Álvaro 2013 E-Book URL Exists Catalogue Record .
18 Internet – Technical Development and Applications Internet – Technical Development and Applications [E-Book] Tkacz, Ewaryst 2009 E-Book URL Exists Catalogue Record .
19 Internet-Security aus Software-Sicht: Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche Internet-Security aus Software-Sicht: Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche [E-Book]   2008 E-Book URL Exists Catalogue Record .
20 Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern [E-Book]   2007 E-Book URL Exists Catalogue Record .
Suchergebnisseite: .   1 NNN 2 .   . Bottom Nächste .   . Seite: 1 von 2
Die Titel, die in Fettdruck angezeigt werden, haben verfügbare Medien, Titel ohne Fettdruck haben derzeit keine verfügbaren Medien.

Schnellsuche