„Spring Security“
Suchergebnisse
6.001 Treffer
-
Using Imperfect Semiconductor Systems for Unique Identification
-
IT Convergence and Security 2017 – Volume 1
-
Special issue on biodiversity and food security: from trade-offs to synergies
-
Security of 2t-root identification and signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143156 page 148, section 3, line 5 of the proof of Theorem 3. Correction.
-
International Conference on Security and Privacy in Communication Networks – 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I
-
Ontological security, circulations of affect, and the Arab Spring
-
Global Food Security and Wellness
-
Libya in the Arab Spring – From Revolution to Insecurity
-
Global Food Security and Wellness
-
Climate change, security risks, and conflict reduction in Africa – a case study of farmer-herder conflicts over natural resources in Côte d'Ivoire, Ghana, and Burkina Faso 1960-2000
-
Advances in cryptology – ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings
-
Become ITIL Foundation Certified in 7 Days – Learning ITIL Made Simple with Real-life Examples
-
International Political Psychology – Explorations into a New Discipline
-
Nazi secret warfare in occupied Persia (Iran) – the failure of the German intelligence services, 1939-45
-
Europe as a Stronger Global Actor – Challenges and Strategic Responses
-
The "Arab Spring": A Different Conceptualization – Are We Moving Toward a Post-Arab-Islamic Middle East and North Africa?
-
Strategic cultural change and the challenge for security policy – Germany and the Bundeswehr's deployment to Afghanistan
-
Nanomaterials for Security
-
History and foreign policy in France and Germany
-
Germany's new security demographics – military recruitment in the era of population aging