Explore: Kryptosystem
Discover books, insights, and more — all in one place.
Learn more about Kryptosystem with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “kryptosystem”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Churchill's secret war
By Robin Denniston

“Churchill's secret war” Metadata:
- Title: Churchill's secret war
- Author: Robin Denniston
- Language: English
- Number of Pages: Median: 223
- Publisher: ➤ Chancellor Press - Chancellor - Sutton Publishing Ltd - Sutton Publishing - History Press Limited, The - Sutton Publishing+ltd - St. Martin's Press
- Publish Date: ➤ 1996 - 1997 - 1999 - 2000 - 2009 - 2016
- Publish Location: ➤ London - Thrupp, Stroud, Gloucestershire - New York
“Churchill's secret war” Subjects and Themes:
- Subjects: ➤ Cryptography - Electronic intelligence - History - Military leadership - Politics and government - Secret service - World War, 1939-1945 - Command of troops - Außenpolitik - Kryptosystem - Weltkrieg - Geschichte 1942-19451 - Geschichte 1942-1945 - World war, 1939-1945, campaigns - World war, 1939-1945, diplomatic history - Churchill, winston, 1874-1965 - World war, 1939-1945, cryptography - World war, 1939-1945, secret service, great britain - Turkey, history, 1918-1960 - Turkey, politics and government
- People: ➤ Winston Churchill Sir (1874-1965)
- Places: Great Britain - Turkey
- Time: 1918-1960
Edition Identifiers:
- The Open Library ID: ➤ OL37968645M - OL7987892M - OL759108M - OL22134471M - OL10810657M - OL10810348M - OL37944126M
- Online Computer Library Center (OCLC) ID: 36513038
- Library of Congress Control Number (LCCN): 97155547
- All ISBNs: ➤ 9780750912198 - 0752452363 - 9780312165826 - 9780753703823 - 0750912197 - 0753703823 - 0750923296 - 9780750979559 - 9780752452364 - 9780750923293 - 031216582X - 0750979550
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Churchill's secret war at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Number theoretic methods in cryptography
By Igor E. Shparlinski

“Number theoretic methods in cryptography” Metadata:
- Title: ➤ Number theoretic methods in cryptography
- Author: Igor E. Shparlinski
- Language: English
- Number of Pages: Median: 180
- Publisher: Birkhäuser - Birkh�user Basel
- Publish Date: 1999
- Publish Location: Boston - Basel
“Number theoretic methods in cryptography” Subjects and Themes:
- Subjects: ➤ Computational complexity - Cryptography - Number theory - Modularithmetik - Cryptographie - Algebraische Zahlentheorie - Komplexität - Faktorisierung - Kryptosystem - Nombres, Théorie des - Polynom - Boolesche Funktion - Complexité de calcul (Informatique)
Edition Identifiers:
- The Open Library ID: OL90757M
- Online Computer Library Center (OCLC) ID: 41078609
- Library of Congress Control Number (LCCN): 99200367
- All ISBNs: 0817658882 - 9783764358884 - 9780817658885 - 3764358882
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Number theoretic methods in cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Wireless Networks and Security Signals and Communication Technology
By Shafiullah Khan

“Wireless Networks and Security Signals and Communication Technology” Metadata:
- Title: ➤ Wireless Networks and Security Signals and Communication Technology
- Author: Shafiullah Khan
- Number of Pages: Median: 512
- Publisher: ➤ Springer-Verlag Berlin and Heidelberg GmbH & - Springer
- Publish Date: 2013
“Wireless Networks and Security Signals and Communication Technology” Subjects and Themes:
- Subjects: ➤ Wireless communication systems - Security measures - Funknetz - Datensicherung - Computersicherheit - Kryptosystem - Kryptoanalyse - Engineering - Data protection - Telecommunication
Edition Identifiers:
- The Open Library ID: OL26189015M
- Online Computer Library Center (OCLC) ID: 823045645
- Library of Congress Control Number (LCCN): 2012956002
- All ISBNs: 3642361684 - 9783642361685
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Wireless Networks and Security Signals and Communication Technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Grid computing security
By Anirban Chakrabarti

“Grid computing security” Metadata:
- Title: Grid computing security
- Author: Anirban Chakrabarti
- Language: English
- Number of Pages: Median: 331
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2007 - 2010
- Publish Location: New York - Berlin
“Grid computing security” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computersicherheit - Grid Computing - Serviceorientierte Architektur - Kryptosystem - Computer security - Authentifikation - Computational grids (Computer systems) - DoS-Attacke - Electronic systems
Edition Identifiers:
- The Open Library ID: OL37105928M - OL27041885M
- Online Computer Library Center (OCLC) ID: 704285179
- All ISBNs: 9783540444930 - 3540444939 - 3642079431 - 9783642079436
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Grid computing security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition)
By Christoph Meinel and Harald Sack

“Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition)” Metadata:
- Title: ➤ Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition)
- Authors: Christoph MeinelHarald Sack
- Number of Pages: Median: 422
- Publisher: Springer
- Publish Date: 2009
“Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition)” Subjects and Themes:
- Subjects: ➤ World Wide Web - Codierung - Telekommunikationsnetz - Digitalübertragung - World Wide Web - Multimedia - Telekommunikationsnetz - Computersicherheit - Digitalübertragung - Kryptosystem - Rechnernetz - Internet - Datenübertragung - Rechnernetz - Digitalübertragung - Multimedia - Codierung - Computersicherheit - Kryptosystem
Edition Identifiers:
- The Open Library ID: OL26741659M
- All ISBNs: 9783540929222 - 3540929223
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Digitale Kommunikation: Vernetzen, Multimedia, Sicherheit (X.media.press) (German Edition) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Security in pervasive computing
By International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)

“Security in pervasive computing” Metadata:
- Title: ➤ Security in pervasive computing
- Author: ➤ International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)
- Language: English
- Number of Pages: Median: 238
- Publisher: Springer
- Publish Date: 2005
- Publish Location: Berlin - New York
“Security in pervasive computing” Subjects and Themes:
- Subjects: ➤ Computer security - Congresses - Ubiquitous computing - Controle d'acces - Securite informatique - Networking - Securite - Mensch-Maschine-Kommunikation - Mesures de securite - COMPUTERS - Mobile Computing - Congres - Kryptosystem - Systemes informatiques - Internet - Informatique omnipresente - Security - Sicherheitsprotokoll - Informatique - Datensicherung - General - Mesures - Privatsphare
Edition Identifiers:
- The Open Library ID: OL3480170M
- Online Computer Library Center (OCLC) ID: 59557656
- Library of Congress Control Number (LCCN): 2005922931
- All ISBNs: 3540255214 - 9783540255215
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in pervasive computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Information Theoretic Security 7th International Conference Icits 2013 Singapore November 2830 2013 Proceedings
By Carles Padr

“Information Theoretic Security 7th International Conference Icits 2013 Singapore November 2830 2013 Proceedings” Metadata:
- Title: ➤ Information Theoretic Security 7th International Conference Icits 2013 Singapore November 2830 2013 Proceedings
- Author: Carles Padr
- Number of Pages: Median: 259
- Publisher: ➤ Springer International Publishing AG
- Publish Date: 2014
“Information Theoretic Security 7th International Conference Icits 2013 Singapore November 2830 2013 Proceedings” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Congresses - Computer networks - Security measures - Computer security - Codierungstheorie - Informationsloses Beweissystem - Informationstheorie - Kryptologie - Kryptosystem - Mehrparteienprotokoll - Secret-Sharing - Computer networks, security measures - Computer science - Data protection - Coding theory - Information Systems - Systems and Data Security - Data Encryption - Coding and Information Theory - E-Commerce/e-business - Management of Computing and Information Systems - Computers and Society
Edition Identifiers:
- The Open Library ID: OL26188497M
- Library of Congress Control Number (LCCN): 2013957942
- All ISBNs: 9783319042671 - 331904267X
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Theoretic Security 7th International Conference Icits 2013 Singapore November 2830 2013 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Information and communications security
By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

“Information and communications security” Metadata:
- Title: ➤ Information and communications security
- Author: ➤ International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
- Language: English
- Number of Pages: Median: 508
- Publisher: Springer
- Publish Date: 2007
- Publish Location: Berlin - New York
“Information and communications security” Subjects and Themes:
- Subjects: ➤ Telecommunication systems - Datensicherung - Zugriffskontrolle - Computersicherheit - Congresses - Computer security - Authentifikation - Kryptosystem - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Computer science - Computer networks - Computer software - Information networks - Data protection - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL25402688M
- Online Computer Library Center (OCLC) ID: 183257704
- Library of Congress Control Number (LCCN): 2007940029
- All ISBNs: 9783540770473 - 354077047X
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and communications security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information security and privacy
By ACISP 2010 (2010 Sydney, N.S.W.)

“Information security and privacy” Metadata:
- Title: ➤ Information security and privacy
- Author: ➤ ACISP 2010 (2010 Sydney, N.S.W.)
- Language: English
- Number of Pages: Median: 402
- Publisher: Springer
- Publish Date: 2010
- Publish Location: Berlin - New York
“Information security and privacy” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computersicherheit - Hash-Algorithmus - Privatsphäre - Congresses - Computer security - Kryptosystem - Kryptoanalyse - Sicherheitsprotokoll
- Places: Sydney <2010>
Edition Identifiers:
- The Open Library ID: OL25370856M
- Online Computer Library Center (OCLC) ID: 646006883
- Library of Congress Control Number (LCCN): 2010929205
- All ISBNs: 9783642140808 - 3642140807
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security and privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Applied cryptography and network security
By ACNS 2009 (2009 Rocquencourt, Yvelines, France)

“Applied cryptography and network security” Metadata:
- Title: ➤ Applied cryptography and network security
- Author: ➤ ACNS 2009 (2009 Rocquencourt, Yvelines, France)
- Language: English
- Number of Pages: Median: 534
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Applied cryptography and network security” Subjects and Themes:
- Subjects: ➤ Telecommunication - Cryptography - Rechnernetz - Datensicherung - Kongress - Computersicherheit - Congresses - Data encryption (Computer science) - Authentifikation - Kryptosystem - Kryptologie - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Data encryption (computer science) - Computer networks, security measures
- Places: Paris <2009>
Edition Identifiers:
- The Open Library ID: OL24879934M
- Online Computer Library Center (OCLC) ID: 404715835
- Library of Congress Control Number (LCCN): 2009929955
- All ISBNs: 3642019560 - 9783642019562
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applied cryptography and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Provable security
By ProvSec 2009 (2009 Guangzhou, China)

“Provable security” Metadata:
- Title: Provable security
- Author: ➤ ProvSec 2009 (2009 Guangzhou, China)
- Language: English
- Number of Pages: Median: 274
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Provable security” Subjects and Themes:
- Subjects: ➤ Beweisbarkeit - Kryptoanalyse - Cryptography - Datensicherung - Kongress - Computersicherheit - Hash-Algorithmus - Congresses - Computer security - Kryptosystem - Elektronische Unterschrift - Sicherheitsprotokoll
- Places: 2009> Kanton <Stadt
Edition Identifiers:
- The Open Library ID: OL24892434M
- Online Computer Library Center (OCLC) ID: 449850096
- Library of Congress Control Number (LCCN): 2009934940
- All ISBNs: 364204641X - 9783642046414
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Provable security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Applied cryptography and network security
By ACNS 2010 (2010 Beijing, China)

“Applied cryptography and network security” Metadata:
- Title: ➤ Applied cryptography and network security
- Author: ➤ ACNS 2010 (2010 Beijing, China)
- Language: English
- Number of Pages: Median: 564
- Publisher: Springer
- Publish Date: 2010
- Publish Location: New York - Berlin
“Applied cryptography and network security” Subjects and Themes:
- Subjects: ➤ Telecommunication - Cryptography - Rechnernetz - Datensicherung - Computersicherheit - Congresses - Data encryption (Computer science) - Kryptosystem - Kryptologie - Kryptoanalyse - Security measures - Data encryption (computer science)
- Places: Peking <2010>
Edition Identifiers:
- The Open Library ID: OL25066284M
- Online Computer Library Center (OCLC) ID: 644521782
- Library of Congress Control Number (LCCN): 2010928335
- All ISBNs: 9783642137075 - 3642137075
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applied cryptography and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Secure data management
By SDM 2005 (2005 Trondheim, Norway)

“Secure data management” Metadata:
- Title: Secure data management
- Author: ➤ SDM 2005 (2005 Trondheim, Norway)
- Language: English
- Number of Pages: Median: 240
- Publisher: Springer
- Publish Date: 2005
- Publish Location: New York - Berlin
“Secure data management” Subjects and Themes:
- Subjects: ➤ Congresses - Database security - Computers - Access control - Computers, access control - Data mining - Database management - Bases de données - Congrès - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Internet - Security - Networking - General - Informatique - Datenbanksystem - Datensicherung - Datenverwaltung - Geheimnisprinzip - Kryptosystem - Privatsphäre - Zugriffskontrolle - Computer Science - Engineering & Applied Sciences - Base de données - Contrôle d'accès - Ordinateur - Sécurité des données - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL18244804M
- Online Computer Library Center (OCLC) ID: 61430254
- Library of Congress Control Number (LCCN): 2005931521
- All ISBNs: 3540287981 - 9783540287988
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure data management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Cryptographic applications of analytic number theory
By Igor E. Shparlinski

“Cryptographic applications of analytic number theory” Metadata:
- Title: ➤ Cryptographic applications of analytic number theory
- Author: Igor E. Shparlinski
- Language: English
- Number of Pages: Median: 411
- Publisher: ➤ Birkhäuser Verlag - Birkhauser Verlag
- Publish Date: 2003
- Publish Location: Basel - Boston
“Cryptographic applications of analytic number theory” Subjects and Themes:
- Subjects: ➤ Computational complexity - Coding theory - Combinatorial number theory - Combinatorial analysis - Computabilidade e complexidade - Criptologia - Complexite? de calcul (Informatique) - Chiffrement (Informatique) - Generateurs de nombres aleatoires - Theorie des Nombres algebriques - Kryptologie - Analytische Zahlentheorie - Komplexitatstheorie - Kryptosystem - Zufallsgenerator - Pseudozufallszahlen
Edition Identifiers:
- The Open Library ID: OL3565527M
- Online Computer Library Center (OCLC) ID: 51022751
- Library of Congress Control Number (LCCN): 2002038444
- All ISBNs: 3764366540 - 9780817666545 - 9783764366544 - 0817666540
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptographic applications of analytic number theory at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Verschlüsselungsalgorithmen
By Gilbert Brands

“Verschlüsselungsalgorithmen” Metadata:
- Title: Verschlüsselungsalgorithmen
- Author: Gilbert Brands
- Language: ger
- Publisher: Vieweg+Teubner Verlag
- Publish Date: 2002
- Publish Location: Wiesbaden
“Verschlüsselungsalgorithmen” Subjects and Themes:
- Subjects: Kryptosystem - Gruppentheorie - Zahlentheorie
Edition Identifiers:
- The Open Library ID: OL27094355M
- Online Computer Library Center (OCLC) ID: 863817134
- All ISBNs: 9783322802262 - 3322802264
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Verschlüsselungsalgorithmen at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Contemporary cryptology
By Advanced Course on Contemporary Cryptology (2004 Universitat politècnica de Catalunya)

“Contemporary cryptology” Metadata:
- Title: Contemporary cryptology
- Author: ➤ Advanced Course on Contemporary Cryptology (2004 Universitat politècnica de Catalunya)
- Language: English
- Number of Pages: Median: 237
- Publisher: ➤ Birkhäuser Verlag - Birkhauser Verlag
- Publish Date: 2005
- Publish Location: Basel - Boston
“Contemporary cryptology” Subjects and Themes:
- Subjects: ➤ Coding theory - Congresses - Data encryption (Computer science) - Information theory - Cryptography - Kryptologie - Aufsatzsammlung - Berechnungskomplexitat - Zufallsfunktion - Public-Key-Kryptosystem - Mehrparteienprotokoll - Kryptosystem
Edition Identifiers:
- The Open Library ID: OL3425106M
- Online Computer Library Center (OCLC) ID: 60791707
- Library of Congress Control Number (LCCN): 2005048331
- All ISBNs: 081767294X - 376437294X - 9783764372941 - 9780817672942
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Contemporary cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Information Security and Privacy
By Hutchison, David - undifferentiated

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information Systems - Coding theory - Data encryption (Computer science) - Computer networks - Computer science - Data protection - Computer software - Computer security - Congresses - Authentifikation - Kongress - Sicherheitsprotokoll - Datensicherung - Computersicherheit - Hash-Algorithmus - Informationssystem - Privatsphäre - Anonymisierung - Kryptoanalyse - Kryptosystem - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL25564600M
- Online Computer Library Center (OCLC) ID: 419646616
- Library of Congress Control Number (LCCN): 2009930749
- All ISBNs: 9783642026195 - 3642026206 - 3642026192 - 9783642026201
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Foundations and Practice of Security Lecture Notes in Computer Science
By Pascal Lafourcade

“Foundations and Practice of Security Lecture Notes in Computer Science” Metadata:
- Title: ➤ Foundations and Practice of Security Lecture Notes in Computer Science
- Author: Pascal Lafourcade
- Publisher: Springer
- Publish Date: 2012
“Foundations and Practice of Security Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Computer security - Zugriffskontrolle - RFID - Systèmes informatiques - Computersicherheit - Privatsphäre - Chipkarte - Mesures de sûreté - Chiffrierung - Kryptoanalyse - Rechnernetz - Datensicherung - Formale Methode - Informationssystem - Serviceorientierte Architektur - Congresses - Web Services - Kryptosystem - Kryptologie - Verifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26138614M
- Library of Congress Control Number (LCCN): 2011945035
- All ISBNs: 9783642279003 - 3642279007
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Foundations and Practice of Security Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Computer Security – ESORICS 2009
By Michael Backes

“Computer Security – ESORICS 2009” Metadata:
- Title: ➤ Computer Security – ESORICS 2009
- Author: Michael Backes
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Computer Security – ESORICS 2009” Subjects and Themes:
- Subjects: ➤ Computational complexity - Coding theory - Data protection - Computer science - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Authentifikation - Kongress - Zugriffskontrolle - Kryptologie - Rechnernetz - Computersicherheit - Datensicherung - Privatsphäre - Autorisierung - Kryptoanalyse - Sicherheitsprotokoll - Kryptosystem - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25552065M
- Online Computer Library Center (OCLC) ID: 436030831
- Library of Congress Control Number (LCCN): 2009934436
- All ISBNs: 3642044441 - 9783642044441 - 3642044433 - 9783642044434
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security – ESORICS 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Constructive Sidechannel Analysis And Secure Design Third International Workshop Cosade 2012 Darmstadt Germany May 34 2012 Proceedings
By Werner Schindler

“Constructive Sidechannel Analysis And Secure Design Third International Workshop Cosade 2012 Darmstadt Germany May 34 2012 Proceedings” Metadata:
- Title: ➤ Constructive Sidechannel Analysis And Secure Design Third International Workshop Cosade 2012 Darmstadt Germany May 34 2012 Proceedings
- Author: Werner Schindler
- Publisher: Springer
- Publish Date: 2012
“Constructive Sidechannel Analysis And Secure Design Third International Workshop Cosade 2012 Darmstadt Germany May 34 2012 Proceedings” Subjects and Themes:
- Subjects: ➤ Computer security - Congresses - Data encryption (Computer science) - Differentielle Kryptoanalyse - Fehleranalyse - Hardwareentwurf - Implementierung - Kryptosystem - Seitenkanalattacke - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26121374M
- Library of Congress Control Number (LCCN): 2012936495
- All ISBNs: 3642299113 - 9783642299117
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Constructive Sidechannel Analysis And Secure Design Third International Workshop Cosade 2012 Darmstadt Germany May 34 2012 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Advances in Cryptology – ASIACRYPT 2009
By Mitsuru Matsui

“Advances in Cryptology – ASIACRYPT 2009” Metadata:
- Title: ➤ Advances in Cryptology – ASIACRYPT 2009
- Author: Mitsuru Matsui
- Language: English
- Number of Pages: Median: 736
- Publisher: ➤ Springer-Verlag Berlin Heidelberg - Springer
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Advances in Cryptology – ASIACRYPT 2009” Subjects and Themes:
- Subjects: ➤ Computational complexity - Data encryption (Computer science) - Data structures (Computer science) - Mathematics - Computer software - Data protection - Computer science - Data encryption (computer science) - Computer security - Computer networks - Congresses - Cryptography - Hash-Algorithmus - Kongress - Kryptoanalyse - Kryptologie - Kryptosystem - Sicherheitsprotokoll
Edition Identifiers:
- The Open Library ID: OL25538970M
- Library of Congress Control Number (LCCN): 2009938634
- All ISBNs: 9783642103650 - 3642103650 - 9783642103667 - 3642103669
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology – ASIACRYPT 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers
By Souhwan Jung

“Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers” Metadata:
- Title: ➤ Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers
- Author: Souhwan Jung
- Publisher: Springer
- Publish Date: 2012
“Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computer networks - Data protection - Computersicherheit - Netzwerktopologie - Biometrie - Kryptosystem - Data encryption (Computer science) - Computer security - Sensorsystem - Congresses - Kryptoanalyse - Security measures - Authentifikation - Sicherheitsprotokoll
Edition Identifiers:
- The Open Library ID: OL25987407M
- Library of Congress Control Number (LCCN): 2011944973
- All ISBNs: 3642278892 - 9783642278891
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information Security Applications 12th International Workshop Wisa 2011 Jeju Island Korea August 2224 2011 Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Communications and multimedia security
By IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (11th 2010 Linz, Austria)

“Communications and multimedia security” Metadata:
- Title: ➤ Communications and multimedia security
- Author: ➤ IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (11th 2010 Linz, Austria)
- Language: English
- Number of Pages: Median: 280
- Publisher: Springer
- Publish Date: 2010
- Publish Location: Berlin - New York
“Communications and multimedia security” Subjects and Themes:
- Subjects: ➤ Telecommunication systems - Datensicherung - Computer networks - Multimedia - Telekommunikationsnetz - Computersicherheit - Congresses - Computer security - Kryptosystem - Security measures - Information Systems - Data encryption (Computer science) - Computer science - Operating systems (Computers) - Computer software - Computer networks, security measures - Computer networks, congresses
Edition Identifiers:
- The Open Library ID: OL25321438M
- Online Computer Library Center (OCLC) ID: 635376267
- Library of Congress Control Number (LCCN): 2010926923
- All ISBNs: 3642132405 - 9783642132407
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Communications and multimedia security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Foundations of Security Analysis and Design V
By Alessandro Aldini

“Foundations of Security Analysis and Design V” Metadata:
- Title: ➤ Foundations of Security Analysis and Design V
- Author: Alessandro Aldini
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Foundations of Security Analysis and Design V” Subjects and Themes:
- Subjects: ➤ Logic design - Information Systems - Data encryption (Computer science) - Computer networks - Data protection - Computer science - Computer security - Congresses - Security measures - Computersicherheit - Datensicherung - Kryptologie - Kryptosystem - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25560826M
- Online Computer Library Center (OCLC) ID: 435374782
- Library of Congress Control Number (LCCN): 2009932255
- All ISBNs: 9783642038280 - 9783642038297 - 364203828X - 3642038298
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Foundations of Security Analysis and Design V at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Advances in information security and its application
By Jong Hyuk Park

“Advances in information security and its application” Metadata:
- Title: ➤ Advances in information security and its application
- Author: Jong Hyuk Park
- Language: English
- Number of Pages: Median: 126
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Advances in information security and its application” Subjects and Themes:
- Subjects: ➤ Rechnernetz - Datensicherung - Computer networks - Kongress - Computersicherheit - Hardware - Congresses - Data protection - Kryptosystem - Kryptoanalyse - Security measures - Sicherheitsprotokoll - Computer networks, security measures
- Places: Seoul <2009>
Edition Identifiers:
- The Open Library ID: OL25040974M
- Online Computer Library Center (OCLC) ID: 428006895
- Library of Congress Control Number (LCCN): 2009933181
- All ISBNs: 9783642026324 - 364202632X
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information security and its application at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Advances in information security and its application
By Jong Hyuk Park and Jong Hyuk Park

“Advances in information security and its application” Metadata:
- Title: ➤ Advances in information security and its application
- Authors: Jong Hyuk ParkJong Hyuk Park
- Language: English
- Number of Pages: Median: 126
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Advances in information security and its application” Subjects and Themes:
- Subjects: ➤ Rechnernetz - Datensicherung - Computer networks - Kongress - Computersicherheit - Hardware - Congresses - Data protection - Kryptosystem - Kryptoanalyse - Security measures - Sicherheitsprotokoll
- Places: Seoul <2009>
Edition Identifiers:
- The Open Library ID: OL25040975M
- Online Computer Library Center (OCLC) ID: 428006895
- Library of Congress Control Number (LCCN): 2009933181
- All ISBNs: 9783642026324 - 364202632X
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in information security and its application at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cryptology and network security
By International Conference on Cryptology and Network Security (6th 2007 Singapore)

“Cryptology and network security” Metadata:
- Title: ➤ Cryptology and network security
- Author: ➤ International Conference on Cryptology and Network Security (6th 2007 Singapore)
- Language: English
- Number of Pages: Median: 281
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Cryptology and network security” Subjects and Themes:
- Subjects: ➤ Cryptography - Rechnernetz - Datensicherung - Computer networks - Passwort - Computersicherheit - Privatsphäre - Congresses - Kryptosystem - Kryptoanalyse - Security measures - Authentifikation - Computer science - Computer software - Information networks - Data protection - Data encryption (Computer science) - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25084698M
- Online Computer Library Center (OCLC) ID: 183257688
- Library of Congress Control Number (LCCN): 2007939802
- All ISBNs: 3540769684 - 9783540769682
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptology and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Information and Communications Security
By ICICS <12, 2010, Barcelona>

“Information and Communications Security” Metadata:
- Title: ➤ Information and Communications Security
- Author: ICICS <12, 2010, Barcelona>
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2004
- Publish Location: Berlin, Heidelberg
“Information and Communications Security” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Trusted Computing - Computersicherheit - Privatsphäre - Kryptosystem - Anonymität - Kryptoanalyse - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27045405M
- Online Computer Library Center (OCLC) ID: 724681708
- All ISBNs: 9783540301912 - 3540301917
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
By Guilin Wang

“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Metadata:
- Title: ➤ Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings
- Author: Guilin Wang
- Publisher: Springer
- Publish Date: 2010
“Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Coding theory - Computer science - Data protection - Computer networks - Computer software - Data structures (Computer science) - Data encryption (Computer science) - Computer security - Congresses - Telecommunication systems - Security measures - Authentifikation - Computersicherheit - Datensicherung - Kryptoanalyse - Kryptosystem - Sicherheitsprotokoll - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL26094822M
- Library of Congress Control Number (LCCN): 2009940402
- All ISBNs: 9783642111440 - 3642111440
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information And Communications Security 11th International Conference Icics 2009 Beijing China December 1417 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Information systems security
By ICISS 2007 (2007 Delhi, India)

“Information systems security” Metadata:
- Title: Information systems security
- Author: ICISS 2007 (2007 Delhi, India)
- Language: English
- Number of Pages: Median: 322
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information systems security” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Anwendungssystem - Datensicherung - Verteiltes System - Zugriffskontrolle - Computersicherheit - Informationssystem - Congresses - Computer security - Kryptosystem - Information networks - Authentifikation - Data encryption (Computer science) - Information storage and retrieval systems - Computer networks - Data protection - Computer science - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25320500M
- Online Computer Library Center (OCLC) ID: 183258016
- Library of Congress Control Number (LCCN): 2007940398
- All ISBNs: 9783540770855 - 3540770852
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information systems security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Information Security
By Pierangela Samarati

“Information Security” Metadata:
- Title: Information Security
- Author: Pierangela Samarati
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security” Subjects and Themes:
- Subjects: ➤ Data protection - Computer software - Computer science - Software engineering - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Computersicherheit - Kongress - Datensicherung - Eindringerkennung - Kryptoanalyse - Kryptosystem - Zugriffskontrolle - Authentifikation - Sicherheitsprotokoll - Trusted Computing - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25535918M
- Online Computer Library Center (OCLC) ID: 436029082
- Library of Congress Control Number (LCCN): 2009934111
- All ISBNs: 9783642044748 - 3642044735 - 9783642044731 - 3642044743
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Information Security Applications
By Hutchison, David - undifferentiated

“Information Security Applications” Metadata:
- Title: ➤ Information Security Applications
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Number of Pages: Median: 334
- Publisher: ➤ Springer-Verlag - Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security Applications” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Software engineering - Computer science - Data protection - Computer software - Computer security - Congresses - Chipkarte - Kongress - Datensicherung - Drahtloses Sensorsystem - Computersicherheit - Kryptoanalyse - Kryptosystem - Trusted Computing
Edition Identifiers:
- The Open Library ID: OL25542781M
- Online Computer Library Center (OCLC) ID: 310400683
- Library of Congress Control Number (LCCN): 2009920695
- All ISBNs: 9783642003059 - 9783642003066 - 3642003052 - 3642003060
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Advances in Cryptology - EUROCRYPT 2009
By Hutchison, David - undifferentiated

“Advances in Cryptology - EUROCRYPT 2009” Metadata:
- Title: ➤ Advances in Cryptology - EUROCRYPT 2009
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Advances in Cryptology - EUROCRYPT 2009” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computational complexity - Information Systems - Computer science - Computer networks - Data protection - Computer software - Computers - Congresses - Access control - Cryptography - Kryptologie - Kongress - Kryptosystem - Data transmission systems - Security measures
Edition Identifiers:
- The Open Library ID: OL25541420M
- Online Computer Library Center (OCLC) ID: 320198698
- Library of Congress Control Number (LCCN): 2009929951
- All ISBNs: 3642010016 - 9783642010002 - 3642010008 - 9783642010019
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology - EUROCRYPT 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Advances in cryptology-- ASIACRYPT 2007
By International Conference on the Theory and Application of Cryptology and Information Security (13th 2007 Kuching, Sarawak)

“Advances in cryptology-- ASIACRYPT 2007” Metadata:
- Title: ➤ Advances in cryptology-- ASIACRYPT 2007
- Author: ➤ International Conference on the Theory and Application of Cryptology and Information Security (13th 2007 Kuching, Sarawak)
- Language: English
- Number of Pages: Median: 581
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Advances in cryptology-- ASIACRYPT 2007” Subjects and Themes:
- Subjects: ➤ Kryptosystem - Computer security - Cryptography - Congresses - Kryptologie - Kryptoanalyse - Computers, access control - Data transmission systems
Edition Identifiers:
- The Open Library ID: OL25312876M
- Online Computer Library Center (OCLC) ID: 181598603
- Library of Congress Control Number (LCCN): 2007939450
- All ISBNs: 3540768998 - 9783540768999
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advances in cryptology-- ASIACRYPT 2007 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Web Information Systems and Mining
By Fu Lee Wang

“Web Information Systems and Mining” Metadata:
- Title: ➤ Web Information Systems and Mining
- Author: Fu Lee Wang
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2010
- Publish Location: Berlin, Heidelberg
“Web Information Systems and Mining” Subjects and Themes:
- Subjects: ➤ Information systems - Computer science - Software engineering - Database management - Information storage and retrieval systems - Data mining - Multimedia systems - Information retrieval - Web services - World wide web - World Wide Web - Anwendungssystem - Datensicherung - Information Retrieval - Computersicherheit - Informationssystem - Semantic Web - Congresses - Web Services - Data Mining - Kryptosystem - Dienstgüte
Edition Identifiers:
- The Open Library ID: OL25553522M
- Library of Congress Control Number (LCCN): 2010936446
- All ISBNs: 9783642165146 - 364216515X - 9783642165153 - 3642165141
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Web Information Systems and Mining at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Information security and cryptology--ICISC'99
By ICISC'99 (1999 Seoul, Korea)

“Information security and cryptology--ICISC'99” Metadata:
- Title: ➤ Information security and cryptology--ICISC'99
- Author: ICISC'99 (1999 Seoul, Korea)
- Language: English
- Number of Pages: Median: 277
- Publisher: Springer
- Publish Date: 2000
- Publish Location: New York
“Information security and cryptology--ICISC'99” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Cryptography - Schlüsselverwaltung - Computational complexity - Algorithm Analysis and Problem Complexity - Kryptosystem - Computer science - Management of Computing and Information Systems - Kryptoanalyse - Computer software - Information Systems - Discrete Mathematics in Computer Science - Rechnernetz - Elektronische Unterschrift - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Kryptologie - Authentifikation - Computer networks
Edition Identifiers:
- The Open Library ID: OL18139823M
- Online Computer Library Center (OCLC) ID: 43810673
- Library of Congress Control Number (LCCN): 00038822
- All ISBNs: 9783540673804 - 3540673806
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security and cryptology--ICISC'99 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.