Explore: Authentifikation
Discover books, insights, and more — all in one place.
Learn more about Authentifikation with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “authentifikation”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Configuring Windows 2000 Server security
By Thomas W. Shinder, Stace Cunningham, D. Lynn White, Syngress Media and Garrick Olsen

“Configuring Windows 2000 Server security” Metadata:
- Title: ➤ Configuring Windows 2000 Server security
- Authors: Thomas W. ShinderStace CunninghamD. Lynn WhiteSyngress MediaGarrick Olsen
- Language: English
- Number of Pages: Median: 512
- Publisher: Syngress
- Publish Date: 2000
“Configuring Windows 2000 Server security” Subjects and Themes:
- Subjects: ➤ SISTEMAS DE JANELAS - Datensicherung - Computer networks - Microsoft Windows (Computer file) - Computersicherheit - SISTEMAS OPERACIONAIS - Konfiguration (Informatik) - Authentifikation - Security measures - Windows 2000 Server
Edition Identifiers:
- The Open Library ID: OL8778476M
- All ISBNs: 9781928994022 - 1928994024
Author's Alternative Names:
"Inc. Syngress Media", "Lynn D. White" and "Syngress Publishing"Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Configuring Windows 2000 Server security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Mechanics of user identification and authentication
By Dobromir Todorov

“Mechanics of user identification and authentication” Metadata:
- Title: ➤ Mechanics of user identification and authentication
- Author: Dobromir Todorov
- Language: English
- Number of Pages: Median: 744
- Publisher: ➤ Auerbach Publications - Auerbach Pub - Auerbach Publishers, Incorporated - Taylor and Francis - AUERBACH
- Publish Date: 2007
- Publish Location: London - Boca Raton, FL
“Mechanics of user identification and authentication” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Security measures - Computers - Access control - Computer security - Computer networks, security measures - Computers, access control - Authentication - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Sécurité informatique - Systèmes d'exploitation (Ordinateurs) - Authentification - COMPUTERS - Internet - Security - Networking - General - Authentifikation - Computersicherheit - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL37980829M - OL37950430M - OL8484655M - OL22757383M - OL24278188M
- Online Computer Library Center (OCLC) ID: 263353270 - 77716961
- Library of Congress Control Number (LCCN): 2007060355
- All ISBNs: ➤ 9780429133138 - 1466546689 - 0429133138 - 9781420052206 - 1420052209 - 9781420052190 - 1420052195 - 9781466546684
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mechanics of user identification and authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Authentication systems for secure networks
By Rolf Oppliger

“Authentication systems for secure networks” Metadata:
- Title: ➤ Authentication systems for secure networks
- Author: Rolf Oppliger
- Language: English
- Number of Pages: Median: 186
- Publisher: Artech House
- Publish Date: 1996
- Publish Location: Boston
“Authentication systems for secure networks” Subjects and Themes:
- Subjects: ➤ Cryptography - Access control - Computer networks - Computers - Authentication - Security measures - Cryptographie - Securite informatique - Computersicherheit - Reseaux d'ordinateurs - Controle - Datensicherung - Rechnernetz - Mesures de surete - Acces - Authentification - Ordinateurs - Reseau informatique - Authentifikation
Edition Identifiers:
- The Open Library ID: OL815872M
- Online Computer Library Center (OCLC) ID: 34046349
- Library of Congress Control Number (LCCN): 95053773
- All ISBNs: 0890065101 - 9780890065105
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Authentication systems for secure networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Audio-and video-based biometric person authentication
By Josef Bigun

“Audio-and video-based biometric person authentication” Metadata:
- Title: ➤ Audio-and video-based biometric person authentication
- Author: Josef Bigun
- Language: English
- Number of Pages: Median: 374
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2001 - 2003
“Audio-and video-based biometric person authentication” Subjects and Themes:
- Subjects: ➤ Optical pattern recognition - Automatic speech recognition - Congresses - Biometric identification - Elektronischer Fingerabdruck - Identification automatique - Bilderkennung - Reconnaissance automatique de la parole - Reconnaissance optique des formes (Informatique) - Congres - Biometrie - Reconnaissance optique des formes (informatique) - Identification biometrique - Kongress - Gesicht - Automatische Sprechererkennung - Authentifikation - Biometry
Edition Identifiers:
- The Open Library ID: OL9706056M - OL37089920M
- Online Computer Library Center (OCLC) ID: 47097460
- Library of Congress Control Number (LCCN): 2001041102
- All ISBNs: 9783540453444 - 3540422161 - 354045344X - 9783540422167
First Setence:
"Automatic verification and authentication of personal identity based on biométrie measurements has become popular in security applications."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Audio-and video-based biometric person authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Grid computing security
By Anirban Chakrabarti

“Grid computing security” Metadata:
- Title: Grid computing security
- Author: Anirban Chakrabarti
- Language: English
- Number of Pages: Median: 331
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2007 - 2010
- Publish Location: New York - Berlin
“Grid computing security” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computersicherheit - Grid Computing - Serviceorientierte Architektur - Kryptosystem - Computer security - Authentifikation - Computational grids (Computer systems) - DoS-Attacke - Electronic systems
Edition Identifiers:
- The Open Library ID: OL37105928M - OL27041885M
- Online Computer Library Center (OCLC) ID: 704285179
- All ISBNs: 9783540444930 - 3540444939 - 3642079431 - 9783642079436
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Grid computing security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Security protocols
By Bruce Christianson

“Security protocols” Metadata:
- Title: Security protocols
- Author: Bruce Christianson
- Language: English
- Number of Pages: Median: 255
- Publisher: Springer-Verlag - Springer
- Publish Date: 2001
- Publish Location: Berlin - New York
“Security protocols” Subjects and Themes:
- Subjects: ➤ Computers - Cryptographie - Gegevens - Geheimschrift - Systèmes informatiques - Kommunikationsprotokoll - Congrès - Contrôle - Beveiliging - Mesures de sûreté - Databanken - Cryptography - Access control - Datensicherung - Sécurité informatique - Congresses - Computer security - Ordinateurs - Kryptologie - Authentifikation - Accès - Computers, access control - Computer science - Computer networks - Data encryption (Computer science) - Computer software - Management information systems
Edition Identifiers:
- The Open Library ID: OL3951104M
- Online Computer Library Center (OCLC) ID: 47831208
- Library of Congress Control Number (LCCN): 2001044641
- All ISBNs: 9783540425663 - 3540425667
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security protocols at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Art
By David A. Scott

“Art” Metadata:
- Title: Art
- Author: David A. Scott
- Language: English
- Number of Pages: Median: 526
- Publisher: ➤ Cotsen Institute of Archaeology at U C L A - The Cotsen Institute of Archaeology Press
- Publish Date: 2016
“Art” Subjects and Themes:
- Subjects: ➤ Art - Conservation and restoration - Forgeries - Authenticity (Philosophy) - Art, conservation and restoration - Art, forgeries - Kunstfälschung - Authentifikation - Restaurierung - Kunst - Fälschung - Echtheit
Edition Identifiers:
- The Open Library ID: OL46104400M - OL27450502M
- Online Computer Library Center (OCLC) ID: 946142090
- Library of Congress Control Number (LCCN): 2016011510
- All ISBNs: 1938770412 - 9781938770081 - 9781938770418 - 1938770080
Author's Alternative Names:
"David A. Scott odborník v oblasti restaurování", "Scott, David A., 1948-...", "Dr David A. Scott", "Scott, David A.", "Dr David Arthur Scott" and "David Arthur Scott"Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Art at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers
By Hyoung-Joong Kim

“Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers” Metadata:
- Title: ➤ Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers
- Author: Hyoung-Joong Kim
- Publisher: Springer
- Publish Date: 2011
“Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Computer vision - Computer graphics - Coding theory - Computer science - Information storage and retrieval systems - Data structures (Computer science) - Data encryption (Computer science) - Digital watermarking - Congresses - Tatouage numérique - Congrès - Informatique - Elektronisches Wasserzeichen - Steganographie - Kryptoanalyse - Geheimnisprinzip - Multimedia - Sicherheitsprotokoll - Computerforensik - Bildverarbeitung - Authentifikation - Image Processing and Computer Vision - Information retrieval - Information organization - Coding and Information Theory - Cryptology and Information Theory Data Structures - Data Encryption
Edition Identifiers:
- The Open Library ID: OL26050576M
- Online Computer Library Center (OCLC) ID: 704393874
- All ISBNs: 3642184049 - 9783642184048
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Watermarking 9th International Workshop Iwdw 2010 Seoul Korea October 13 2010 Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information and communications security
By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

“Information and communications security” Metadata:
- Title: ➤ Information and communications security
- Author: ➤ International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
- Language: English
- Number of Pages: Median: 508
- Publisher: Springer
- Publish Date: 2007
- Publish Location: Berlin - New York
“Information and communications security” Subjects and Themes:
- Subjects: ➤ Telecommunication systems - Datensicherung - Zugriffskontrolle - Computersicherheit - Congresses - Computer security - Authentifikation - Kryptosystem - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Computer science - Computer networks - Computer software - Information networks - Data protection - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL25402688M
- Online Computer Library Center (OCLC) ID: 183257704
- Library of Congress Control Number (LCCN): 2007940029
- All ISBNs: 9783540770473 - 354077047X
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and communications security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Applied cryptography and network security
By ACNS 2009 (2009 Rocquencourt, Yvelines, France)

“Applied cryptography and network security” Metadata:
- Title: ➤ Applied cryptography and network security
- Author: ➤ ACNS 2009 (2009 Rocquencourt, Yvelines, France)
- Language: English
- Number of Pages: Median: 534
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Applied cryptography and network security” Subjects and Themes:
- Subjects: ➤ Telecommunication - Cryptography - Rechnernetz - Datensicherung - Kongress - Computersicherheit - Congresses - Data encryption (Computer science) - Authentifikation - Kryptosystem - Kryptologie - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Data encryption (computer science) - Computer networks, security measures
- Places: Paris <2009>
Edition Identifiers:
- The Open Library ID: OL24879934M
- Online Computer Library Center (OCLC) ID: 404715835
- Library of Congress Control Number (LCCN): 2009929955
- All ISBNs: 3642019560 - 9783642019562
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applied cryptography and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
- Language: English
- Number of Pages: Median: 297
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Softwareschutz - Kongress - Computersicherheit - Rechnernetz - Computer security - Congresses - Elektronische Unterschrift - Authentifikation - Data encryption (computer science)
- Places: Kagawa <2008>
Edition Identifiers:
- The Open Library ID: OL24561243M
- Online Computer Library Center (OCLC) ID: 276332284
- Library of Congress Control Number (LCCN): 2008939387
- All ISBNs: 9783540895978 - 3540895973
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Future Generation Information Technology
By Tai-hoon Kim

“Future Generation Information Technology” Metadata:
- Title: ➤ Future Generation Information Technology
- Author: Tai-hoon Kim
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2010
- Publish Location: Berlin, Heidelberg
“Future Generation Information Technology” Subjects and Themes:
- Subjects: ➤ Information systems - Computer science - Software engineering - Optical pattern recognition - Computer networks - Artificial intelligence - Computer software - Information technology - Electronic data processing - Computersicherheit - Telekommunikation - Kryptoanalyse - Datenverarbeitung - Energieeffizienz - Software Engineering - Berechenbarkeit - Netzwerkverwaltung - Netzwerktopologie - Drahtloses Sensorsystem - Congresses - Datenanalyse - Authentifikation
Edition Identifiers:
- The Open Library ID: OL25570236M
- Library of Congress Control Number (LCCN): 2010940214
- All ISBNs: 3642175686 - 9783642175695 - 3642175694 - 9783642175688
Author's Alternative Names:
"Tai-Hoon Kim"Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Future Generation Information Technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Information Security and Cryptology – ICISC 2008
By Hutchison, David - undifferentiated

“Information Security and Cryptology – ICISC 2008” Metadata:
- Title: ➤ Information Security and Cryptology – ICISC 2008
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security and Cryptology – ICISC 2008” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computational complexity - Information Systems - Computer science - Computer networks - Data protection - Computer software - Cryptography - Computer security - Authentication - Congresses - Authentifikation - Kongress - Chiffrierung - Kryptologie - Digital Rights Management - Privatsphäre - Kryptoanalyse - Rechnernetz - Datensicherung - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL25549179M
- Online Computer Library Center (OCLC) ID: 310400745
- Library of Congress Control Number (LCCN): 2009935271
- All ISBNs: 9783642007309 - 3642007295 - 3642007309 - 9783642007293
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Cryptology – ICISC 2008 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Privacy enhancing technologies
By PET 2002 (2002 San Francisco, Calif.)

“Privacy enhancing technologies” Metadata:
- Title: Privacy enhancing technologies
- Author: ➤ PET 2002 (2002 San Francisco, Calif.)
- Language: English
- Number of Pages: Median: 238
- Publisher: Springer-Verlag
- Publish Date: 2003
- Publish Location: New York
“Privacy enhancing technologies” Subjects and Themes:
- Subjects: ➤ Congrès - REDES DE COMPUTADORES - Privatsphäre - Internet - CRIPTOLOGIA - Datensicherung - Computer security - Kryptologie - Security measures - Zugriffskontrolle - Electronic Commerce - Mesures - Réseaux d'ordinateurs - SEGURANÇA EM COMPUTADOR - Computer networks - Sécurité informatique - Congresses - Datenschutz - Sécurité - Authentifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL18183564M
- Online Computer Library Center (OCLC) ID: 223630116 - 51553474
- Library of Congress Control Number (LCCN): 2003043439
- All ISBNs: 354000565X - 9783540005650
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy enhancing technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Multimedia information retrieval and management
By David Dagan Feng and Wan-Chi Siu

“Multimedia information retrieval and management” Metadata:
- Title: ➤ Multimedia information retrieval and management
- Authors: David Dagan FengWan-Chi Siu
- Language: English
- Number of Pages: Median: 476
- Publisher: Springer
- Publish Date: 2003
“Multimedia information retrieval and management” Subjects and Themes:
- Subjects: ➤ Multimedia systems - Information retrieval - Information resources management - Authentifikation - Bildbanksystem - Content Management - Elektronisches Wasserzeichen - Information Retrieval - Multimedia - MPEG 7.
Edition Identifiers:
- The Open Library ID: OL9053711M
- Online Computer Library Center (OCLC) ID: 51204028
- Library of Congress Control Number (LCCN): 2002044501
- All ISBNs: 3540002448 - 9783540002444
First Setence:
"Content-based image retrieval, a technique which uses visual contents to search images from large scale image databases according to users' interests, has been an active and fast advancing research area since the 1990s."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multimedia information retrieval and management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Information Security and Privacy
By Hutchison, David - undifferentiated

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information Systems - Coding theory - Data encryption (Computer science) - Computer networks - Computer science - Data protection - Computer software - Computer security - Congresses - Authentifikation - Kongress - Sicherheitsprotokoll - Datensicherung - Computersicherheit - Hash-Algorithmus - Informationssystem - Privatsphäre - Anonymisierung - Kryptoanalyse - Kryptosystem - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL25564600M
- Online Computer Library Center (OCLC) ID: 419646616
- Library of Congress Control Number (LCCN): 2009930749
- All ISBNs: 9783642026195 - 3642026206 - 3642026192 - 9783642026201
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Biometric ID Management and Multimodal Communication
By Julian Fierrez

“Biometric ID Management and Multimodal Communication” Metadata:
- Title: ➤ Biometric ID Management and Multimodal Communication
- Author: Julian Fierrez
- Language: English
- Number of Pages: Median: 371
- Publisher: ➤ Springer - Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Biometric ID Management and Multimodal Communication” Subjects and Themes:
- Subjects: ➤ Biometric identification - Computer vision - Computer science - Optical pattern recognition - Information storage and retrieval systems - Artificial intelligence - Biometry - Congresses - Human face recognition (Computer science) - Pattern recognition systems - Biometrie - Kongress - Authentifikation - Datenbank - Personenbezogene Daten - Bilderkennung - Gesicht - Handschrift <Graphologie> - Unterschrift - Identitätsverwaltung - Multimodales System - Handschrift (Graphologie)
Edition Identifiers:
- The Open Library ID: OL25560401M
- Online Computer Library Center (OCLC) ID: 502500568
- Library of Congress Control Number (LCCN): 2009934011
- All ISBNs: 9783642043918 - 3642043917 - 9783642043901 - 3642043909
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Biometric ID Management and Multimodal Communication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Radio Frequency Identification: Security and Privacy Issues
By Siddika Berna Ors Yalcin

“Radio Frequency Identification: Security and Privacy Issues” Metadata:
- Title: ➤ Radio Frequency Identification: Security and Privacy Issues
- Author: Siddika Berna Ors Yalcin
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2010
- Publish Location: Berlin, Heidelberg
“Radio Frequency Identification: Security and Privacy Issues” Subjects and Themes:
- Subjects: ➤ Information Systems - Computer science - Software engineering - Computer networks - Computer software - Data protection - Data encryption (Computer science) - Datensicherung - RFID - Radio frequency identification systems - Privatsphäre - Congresses - Kryptoanalyse - Security measures - Authentifikation - Data encryption (computer science) - Cryptography
Edition Identifiers:
- The Open Library ID: OL25565396M
- Library of Congress Control Number (LCCN): 2010937761
- All ISBNs: 3642168213 - 9783642168215 - 3642168221 - 9783642168222
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Radio Frequency Identification: Security and Privacy Issues at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings
By Noboru Kunihiro

“Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings” Metadata:
- Title: ➤ Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings
- Author: Noboru Kunihiro
- Publisher: Springer
- Publish Date: 2010
“Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Computer software - Data protection - Computer science - Access control - Datensicherung - Computers - Sicherheitsprotokoll - Computersicherheit - Zugriffskontrolle - Rechnernetz - Congresses - Computer security - Kryptologie - Elektronische Unterschrift - Authentifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26086736M
- Library of Congress Control Number (LCCN): 2010937763
- All ISBNs: 9783642168246 - 3642168248
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances In Information And Computer Security 5th International Workshop On Security Iwsec 2010 Kobe Japan November 2224 2010 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Computer Security – ESORICS 2009
By Michael Backes

“Computer Security – ESORICS 2009” Metadata:
- Title: ➤ Computer Security – ESORICS 2009
- Author: Michael Backes
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Computer Security – ESORICS 2009” Subjects and Themes:
- Subjects: ➤ Computational complexity - Coding theory - Data protection - Computer science - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Authentifikation - Kongress - Zugriffskontrolle - Kryptologie - Rechnernetz - Computersicherheit - Datensicherung - Privatsphäre - Autorisierung - Kryptoanalyse - Sicherheitsprotokoll - Kryptosystem - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25552065M
- Online Computer Library Center (OCLC) ID: 436030831
- Library of Congress Control Number (LCCN): 2009934436
- All ISBNs: 3642044441 - 9783642044441 - 3642044433 - 9783642044434
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security – ESORICS 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers
By Souhwan Jung

“Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers” Metadata:
- Title: ➤ Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers
- Author: Souhwan Jung
- Publisher: Springer
- Publish Date: 2012
“Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computer networks - Data protection - Computersicherheit - Netzwerktopologie - Biometrie - Kryptosystem - Data encryption (Computer science) - Computer security - Sensorsystem - Congresses - Kryptoanalyse - Security measures - Authentifikation - Sicherheitsprotokoll
Edition Identifiers:
- The Open Library ID: OL25987407M
- Library of Congress Control Number (LCCN): 2011944973
- All ISBNs: 3642278892 - 9783642278891
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Digital watermarking
By IWDW 2009 (2009 Guildford, England)

“Digital watermarking” Metadata:
- Title: Digital watermarking
- Author: ➤ IWDW 2009 (2009 Guildford, England)
- Language: English
- Number of Pages: Median: 335
- Publisher: Springer
- Publish Date: 2009
- Publish Location: Berlin - New York
“Digital watermarking” Subjects and Themes:
- Subjects: ➤ Computerforensik - Digital watermarking - Data protection - Multimedia - Elektronisches Wasserzeichen - Steganographie - Congresses - Geheimnisprinzip - Computer security - Kongress - Bildverarbeitung - Kryptoanalyse - Authentifikation - Sicherheitsprotokoll - Watermarks
- Places: Guildford <2009>
Edition Identifiers:
- The Open Library ID: OL25092178M
- Online Computer Library Center (OCLC) ID: 436909825
- Library of Congress Control Number (LCCN): 2009932260
- All ISBNs: 9783642036873 - 3642036872
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital watermarking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Advances in multimedia information processing-- PCM 2009
By IEEE Pacific Rim Conference on Multimedia (10th 2009 Bangkok, Thailand)

“Advances in multimedia information processing-- PCM 2009” Metadata:
- Title: ➤ Advances in multimedia information processing-- PCM 2009
- Author: ➤ IEEE Pacific Rim Conference on Multimedia (10th 2009 Bangkok, Thailand)
- Language: English
- Number of Pages: Median: 1323
- Publisher: Springer
- Publish Date: 2009
- Publish Location: Berlin - New York
“Advances in multimedia information processing-- PCM 2009” Subjects and Themes:
- Subjects: ➤ Streaming <Kommunikationstechnik> - Anwendungssystem - Multimedia systems - Multimedia - Information Retrieval - Streaming (Kommunikationstechnik) - Content Management - Datenkompression - Codierung - Videoübertragung - Kongress - Bildverbesserung - Softwareplattform - Congresses - Elektronisches Wasserzeichen - Videobearbeitung - Authentifikation - Computer vision - Information systems - Computer science - Optical pattern recognition - Computer networks
- Places: Bangkok <2009>
Edition Identifiers:
- The Open Library ID: OL25219086M
- Online Computer Library Center (OCLC) ID: 471802202
- Library of Congress Control Number (LCCN): 2009939333
- All ISBNs: 9783642104664 - 3642104665
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in multimedia information processing-- PCM 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Advances in information and computer security
By International Workshop on Security (4th 2009 Toyama-shi, Japan)

“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (4th 2009 Toyama-shi, Japan)
- Language: English
- Number of Pages: Median: 227
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Sicherheitsprotokoll - Kongress - Computersicherheit - Rechnernetz - Data encryption (Computer science) - Computer security - Congresses - Elektronische Unterschrift - Authentifikation - Information Systems - Computer science - Computer networks - Operating systems (Computers) - Data protection - Computer software - Data encryption (computer science)
- Places: Toyama <2009>
Edition Identifiers:
- The Open Library ID: OL25337196M
- Online Computer Library Center (OCLC) ID: 449850195
- Library of Congress Control Number (LCCN): 2009935384
- All ISBNs: 3642048455 - 9783642048456
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Advances in information and computer security
By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

“Advances in information and computer security” Metadata:
- Title: ➤ Advances in information and computer security
- Author: ➤ International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
- Language: English
- Number of Pages: Median: 297
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Advances in information and computer security” Subjects and Themes:
- Subjects: ➤ Kryptoanalyse - Computers - Access control - Datensicherung - Zugriffskontrolle - Softwareschutz - Kongress - Computersicherheit - Rechnernetz - Computer security - Congresses - Elektronische Unterschrift - Authentifikation
- Places: Kagawa <2008>
Edition Identifiers:
- The Open Library ID: OL24573363M
- Online Computer Library Center (OCLC) ID: 276332284
- Library of Congress Control Number (LCCN): 2008939387
- All ISBNs: 9783540895978 - 3540895973
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information and computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Future generation information technology
By FGIT 2009 (2009 Cheju Island, Korea)

“Future generation information technology” Metadata:
- Title: ➤ Future generation information technology
- Author: ➤ FGIT 2009 (2009 Cheju Island, Korea)
- Language: English
- Number of Pages: Median: 318
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Future generation information technology” Subjects and Themes:
- Subjects: ➤ Software engineering - Computersicherheit - Telekommunikation - Kryptoanalyse - Datenverarbeitung - Energieeffizienz - Software Engineering - Berechenbarkeit - Electronic data processing - Netzwerkverwaltung - Netzwerktopologie - Drahtloses Sensorsystem - Congresses - Authentifikation - Datenanalyse - Information technology - Routing
Edition Identifiers:
- The Open Library ID: OL25279434M
- Online Computer Library Center (OCLC) ID: 475663953
- Library of Congress Control Number (LCCN): 2009939138
- All ISBNs: 9783642105081 - 3642105084
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Future generation information technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cryptology and network security
By International Conference on Cryptology and Network Security (6th 2007 Singapore)

“Cryptology and network security” Metadata:
- Title: ➤ Cryptology and network security
- Author: ➤ International Conference on Cryptology and Network Security (6th 2007 Singapore)
- Language: English
- Number of Pages: Median: 281
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Cryptology and network security” Subjects and Themes:
- Subjects: ➤ Cryptography - Rechnernetz - Datensicherung - Computer networks - Passwort - Computersicherheit - Privatsphäre - Congresses - Kryptosystem - Kryptoanalyse - Security measures - Authentifikation - Computer science - Computer software - Information networks - Data protection - Data encryption (Computer science) - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25084698M
- Online Computer Library Center (OCLC) ID: 183257688
- Library of Congress Control Number (LCCN): 2007939802
- All ISBNs: 3540769684 - 9783540769682
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptology and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Privacy Enhancing Technologies
By Ian Goldberg

“Privacy Enhancing Technologies” Metadata:
- Title: Privacy Enhancing Technologies
- Author: Ian Goldberg
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Privacy Enhancing Technologies” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Information storage and retrieval systems - Data protection - Computer science - Computer security - Cryptography - Congresses - Internet - Kongress - Privatsphäre - Anonymität - Computersicherheit - Datensicherung - Netzwerkverwaltung - Authentifikation - Kryptoanalyse
Edition Identifiers:
- The Open Library ID: OL25535598M
- Online Computer Library Center (OCLC) ID: 428011999
- Library of Congress Control Number (LCCN): 2009930653
- All ISBNs: 3642031676 - 3642031684 - 9783642031670 - 9783642031687
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy Enhancing Technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Information and Communications Security
By ICICS <12, 2010, Barcelona>

“Information and Communications Security” Metadata:
- Title: ➤ Information and Communications Security
- Author: ICICS <12, 2010, Barcelona>
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2004
- Publish Location: Berlin, Heidelberg
“Information and Communications Security” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Trusted Computing - Computersicherheit - Privatsphäre - Kryptosystem - Anonymität - Kryptoanalyse - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27045405M
- Online Computer Library Center (OCLC) ID: 724681708
- All ISBNs: 9783540301912 - 3540301917
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
By Guilin Wang

“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Metadata:
- Title: ➤ Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
- Author: Guilin Wang
- Publisher: Springer
- Publish Date: 2010
“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Coding theory - Computer science - Data protection - Computer networks - Computer software - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Telecommunication systems - Security measures - Authentifikation - Computersicherheit - Datensicherung - Kryptoanalyse - Kryptosystem - Sicherheitsprotokoll - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL26094822M
- Library of Congress Control Number (LCCN): 2009940402
- All ISBNs: 9783642111440 - 3642111440
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Information systems security
By ICISS 2007 (2007 Delhi, India)

“Information systems security” Metadata:
- Title: Information systems security
- Author: ICISS 2007 (2007 Delhi, India)
- Language: English
- Number of Pages: Median: 322
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information systems security” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Anwendungssystem - Datensicherung - Verteiltes System - Zugriffskontrolle - Computersicherheit - Informationssystem - Congresses - Computer security - Kryptosystem - Information networks - Authentifikation - Data encryption (Computer science) - Information storage and retrieval systems - Computer networks - Data protection - Computer science - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25320500M
- Online Computer Library Center (OCLC) ID: 183258016
- Library of Congress Control Number (LCCN): 2007940398
- All ISBNs: 9783540770855 - 3540770852
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information systems security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings
By Sushil Jajodia

“Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings” Metadata:
- Title: ➤ Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings
- Author: Sushil Jajodia
- Publisher: Springer
- Publish Date: 2012
“Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Systems and Data Security - Information organization - Computer networks - Data protection - Information retrieval - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Information storage and retrieval systems - Data Encryption - Data encryption (Computer science) - Computer security - Information networks - Schlüsselverwaltung - Zugriffskontrolle - Computers - Computersicherheit - Privatsphäre - Kryptoanalyse - Access control - Datensicherung - Rechnernetz - Informationssystem - Congresses - Security measures - Authentifikation - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL25993871M
- Library of Congress Control Number (LCCN): 2011941662
- All ISBNs: 9783642255595 - 3642255590
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings
By Indranil Sen Gupta

“Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings” Metadata:
- Title: ➤ Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings
- Author: Indranil Sen Gupta
- Publisher: Springer
- Publish Date: 2010
“Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Computer science - Computer networks - Information storage and retrieval systems - Biometry - Data protection - Data encryption (Computer science) - Computer security - Data encryption (computer science) - Congresses - Information networks - Access control - Computers - Authentifikation - Computersicherheit - Datenbanksystem - Datensicherung - Elektronisches Wasserzeichen - Kryptoanalyse - Kryptologie - Rechnernetz - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL26074360M
- Library of Congress Control Number (LCCN): 2009939539
- All ISBNs: 3642107710 - 9783642107719
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Information security and cryptology - ICISC 2007
By ICISC 2007 (2007 Seoul, Korea)

“Information security and cryptology - ICISC 2007” Metadata:
- Title: ➤ Information security and cryptology - ICISC 2007
- Author: ICISC 2007 (2007 Seoul, Korea)
- Language: English
- Number of Pages: Median: 366
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information security and cryptology - ICISC 2007” Subjects and Themes:
- Subjects: ➤ Cryptography - Rechnernetz - Datensicherung - Computersicherheit - Chipkarte - Computer security - Biometrie - Chiffrierung - Congresses - Kryptologie - Kryptoanalyse - Authentifikation - Computational complexity - Data encryption (Computer science) - Computer networks - Information networks - Data protection - Computer software
Edition Identifiers:
- The Open Library ID: OL25336963M
- Online Computer Library Center (OCLC) ID: 182526854
- Library of Congress Control Number (LCCN): 2007939824
- All ISBNs: 9783540767879 - 3540767878
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information security and cryptology - ICISC 2007 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Information Security
By Pierangela Samarati

“Information Security” Metadata:
- Title: Information Security
- Author: Pierangela Samarati
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security” Subjects and Themes:
- Subjects: ➤ Data protection - Computer software - Computer science - Software engineering - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Computersicherheit - Kongress - Datensicherung - Eindringerkennung - Kryptoanalyse - Kryptosystem - Zugriffskontrolle - Authentifikation - Sicherheitsprotokoll - Trusted Computing - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25535918M
- Online Computer Library Center (OCLC) ID: 436029082
- Library of Congress Control Number (LCCN): 2009934111
- All ISBNs: 9783642044748 - 3642044735 - 9783642044731 - 3642044743
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Information Security And Cryptology 4th International Conference Inscrypt 2008 Beijing China December 1417 2008 Revised Selected Papers
By Peng Liu

“Information Security And Cryptology 4th International Conference Inscrypt 2008 Beijing China December 1417 2008 Revised Selected Papers” Metadata:
- Title: ➤ Information Security And Cryptology 4th International Conference Inscrypt 2008 Beijing China December 1417 2008 Revised Selected Papers
- Author: Peng Liu
- Publisher: Springer
- Publish Date: 2009
“Information Security And Cryptology 4th International Conference Inscrypt 2008 Beijing China December 1417 2008 Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Computer science - Data protection - Computer software - Computer security - Congresses - Cryptography - Authentifikation - Kongress - Computersicherheit - Datensicherung - Kryptoanalyse - Kryptologie - Authentication
Edition Identifiers:
- The Open Library ID: OL25989537M
- Online Computer Library Center (OCLC) ID: 319496961
- Library of Congress Control Number (LCCN): 2009935466
- All ISBNs: 9783642014390 - 3642014399
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Security And Cryptology 4th International Conference Inscrypt 2008 Beijing China December 1417 2008 Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
By Willem Jonker

“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Metadata:
- Title: ➤ Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
- Author: Willem Jonker
- Publisher: Springer
- Publish Date: 2009
“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Database management - Information storage and retrieval systems - Computer network architectures - Computer science - Authentication - Congresses - Computer security - Datenbanksystem - Kongress - Datensicherung - Datenverwaltung - Privatsphäre - Trusted Computing - Zugriffskontrolle - Authentifikation
Edition Identifiers:
- The Open Library ID: OL25995094M
- Online Computer Library Center (OCLC) ID: 436029042
- Library of Congress Control Number (LCCN): 2009933478
- All ISBNs: 364204218X - 9783642042188
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Sicherheitskonzepte im WWW
By Stefan Nusser

“Sicherheitskonzepte im WWW” Metadata:
- Title: Sicherheitskonzepte im WWW
- Author: Stefan Nusser
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 1998
- Publish Location: Berlin, Heidelberg
“Sicherheitskonzepte im WWW” Subjects and Themes:
- Subjects: ➤ World Wide Web - Zugriffskontrolle - Datensicherung - IP - Kryptologie - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27087490M
- Online Computer Library Center (OCLC) ID: 863805970
- All ISBNs: 3642804748 - 9783642804748
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Sicherheitskonzepte im WWW at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Information security and cryptology--ICISC'99
By ICISC'99 (1999 Seoul, Korea)

“Information security and cryptology--ICISC'99” Metadata:
- Title: ➤ Information security and cryptology--ICISC'99
- Author: ICISC'99 (1999 Seoul, Korea)
- Language: English
- Number of Pages: Median: 277
- Publisher: Springer
- Publish Date: 2000
- Publish Location: New York
“Information security and cryptology--ICISC'99” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Cryptography - Schlüsselverwaltung - Computational complexity - Algorithm Analysis and Problem Complexity - Kryptosystem - Computer science - Management of Computing and Information Systems - Kryptoanalyse - Computer software - Information Systems - Discrete Mathematics in Computer Science - Rechnernetz - Elektronische Unterschrift - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Kryptologie - Authentifikation - Computer networks
Edition Identifiers:
- The Open Library ID: OL18139823M
- Online Computer Library Center (OCLC) ID: 43810673
- Library of Congress Control Number (LCCN): 00038822
- All ISBNs: 9783540673804 - 3540673806
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security and cryptology--ICISC'99 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Privacy enhancing technologies

“Privacy enhancing technologies” Metadata:
- Title: Privacy enhancing technologies
- Language: English
- Number of Pages: Median: 239
- Publisher: Springer
- Publish Date: 2003
“Privacy enhancing technologies” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Electronic Commerce - Congrès - REDES DE COMPUTADORES - Privatsphäre - Réseaux d'ordinateurs - Internet - SEGURANÇA EM COMPUTADOR - CRIPTOLOGIA - Datensicherung - Computer networks - Security measures - Sécurité informatique - Congresses - Computer security - Mesures - Kryptologie - Datenschutz - Sécurité - Authentifikation - SEGURANÇA EM COMPUTADOR - Réseaux d'ordinateurs - Sécurité informatique - Privatsphäre
Edition Identifiers:
- The Open Library ID: OL9053821M
- Library of Congress Control Number (LCCN): 2003043439
- All ISBNs: 9783540005650 - 354000565X
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Privacy enhancing technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.