Поисковый запрос: (<.>S=Data encryption<.>) |
Общее количество найденных документов : 78
Показаны документы с 1 по 30 |
|
1.
| Ad hoc networks/ed. J. Zheng [et al.]. - 2010
|
2.
| Advances in cryptology - asiacrypt 2010/ed. M. Abe. - 2010
|
3.
| Advances in cryptology – Eurocrypt 2011/ed. K. G. Paterson. - 2011
|
4.
| Advances in digital forensics vi/eds.: K. Chow, S. Shenoi. - 2010
|
5.
| Advances in information and computer security/ed. I. Echizen [et al.]. - 2010
|
6.
| Advances in information technology/ed. B. Papasratorn [et al.]. - 2010
|
7.
| Applied cryptography and network security/eds. J. Lopez, G. Tsudik. - 2011
|
8.
| Automated reasoning for security protocol analysis and issues in the theory of security/eds.: A. Armando, G. Lowe. - 2011
|
9.
| Autonomic and trusted computing/ed. B. Xie [et al.]. - 2010
|
10.
| Coding and cryptology/eds. Y. M. Chee [et al.]. - 2011
|
11.
| Collaborative networks for a sustainable world/ed. L. M. Camarinha-Matos [et al.]. - 2010
|
12.
| Communication and networking/ed. T. Kim [et al.]. - 2010
|
13.
| Computer security – esorics 2010/eds. D. Gritzalis [et al.]. - 2010
|
14.
| Cryptology and network security/ed. S. Heng [et al.]. - 2010
|
15.
| Data and applications security and privacy xxv/ed. Y. Li. - 2011
|
16.
| Data privacy management and autonomous spontaneous security/ed. J. Garcia-Alfaro [et al.]. - 2011
|
17.
| Decision and game theory for security/ed. T. Alpcan [et al.]. - 2010
|
18.
| Detection of intrusions and malware, and vulnerability assessment/ed. T. Holz, H. Bos. - 2011
|
19.
| Digital privacy/ed. J. Camenisch [et al.]. - 2011
|
20.
| Digital watermarking/ed. H. Kim [et al.]. - 2011
|
21.
| e-Business and telecommunications/eds. M. S. Obaidat, J. Filipe. - 2011
|
22.
| Kiayias A. Encryption for digital content/A. Kiayias, S. Pehlivanoglu. - 2010
|
23.
| Engineering secure software and systems/ed. Ú. Erlingsson [et al.]. - 2011
|
24.
| Fast software encryption/ed. A. Joux. - 2011
|
25.
| Formal aspects of security and trust/ed. P. Degano [et al.]. - 2011
|
26.
| Future challenges in security and privacy for academia and industry/eds. J. Camenisch [et al.]. - 2011
|
27.
| Global security, safety, and sustainability/ed. S. Tenreiro de Magalhães [et al.]. - 2010
|
28.
| Chatterjee S. Identity-Based encryption/S. Chatterjee, P. Sarkar. - 2011
|
29.
| Information and automation/ed. L. Qi. - 2011
|
30.
| Information and communications security/ed. M. Soriano [et al.]. - 2010
|
|
|
|