„Spring Security“
Suchergebnisse
6.001 Treffer
-
Advances in Cryptology – CRYPTO 2014 – 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
-
Cryptography and Security: From Theory to Applications – Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
-
Cryptography and security: from theory to applications – essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday
-
Energy Security – International and Local Issues, Theoretical Perspectives, and Critical Energy Infrastructures
-
Security with Noisy Data – On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
Rhetoric and the Global Turn in Higher Education
-
The Organization for Security and Cooperation in Europe at 50 – Conflict Management During and After the Cold War
-
Food Literacy, Curriculum, and The Global South – Examples from South Asia
-
A Classical Introduction to Cryptography – Applications for Communications Security
-
An Introduction to Mathematical Finance with Applications – Understanding and Building Financial Intuition
-
The New Codebreakers – Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
-
The new codebreakers – essays dedicated to David Kahn on the occasion of His 85th birthday
-
On the Physical Security of Physically Unclonable Functions
-
On the Learnability of Physically Unclonable Functions
-
Smart City 360° – First EAI International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papers
-
The Handbook of Security
-
Proceedings of the International Conference on Data Engineering and Communication Technology – ICDECT 2016, Volume 2
-
Proceedings of the International Conference on Data Engineering and Communication Technology – ICDECT 2016, Volume 1
-
Police and Citizen Participation – Impulses for More Trust, Cooperation, and Acceptance
-
Enhancing Citizens’ Role in Public Safety – Interaction, Perception and Design of Mobile Warning Apps