Title: Zero Trust Journey Across the Digital Estate, Author: Abbas Kudrati
Title: WCDMA Design Handbook, Author: Andrew Richardson
Title: Wavelet, Subband and Block Transforms in Communications and Multimedia, Author: Ali N. Akansu
Title: Vulnerability Analysis and Defense for the Internet, Author: Abhishek Singh
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Visual Content Processing and Representation: 9th International Workshop, VLBV 2005, Sardinia, Italy, September 15-16, 2005, Revised Selected Papers, Author: Luigi Atzori
Title: Visual Content Processing and Representation: 8th International Workshop, VLBV 2003, Madrid, Spain, September 18-19, 2003, Proceedings, Author: Narciso Garcia
Title: Verschlüsselungsalgorithmen: Angewandte Zahlentheorie rund um Sicherheitsprotokolle, Author: Gilbert Brands
Title: United States Diplomatic Codes and Ciphers, 1775-1938, Author: Ralph E. Weber
Title: Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects, Author: Akira Summers
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Turing's Connectionism: An Investigation of Neural Network Architectures, Author: Christof Teuscher
Title: Turing Machines with Sublogarithmic Space, Author: Andrzej Szepietowski
Title: Turbo Codes: Principles and Applications, Author: Branka Vucetic
Title: Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers, Author: Roberto Bruni
Title: Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings, Author: Stefan Katzenbeisser
Title: Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, Author: Kathleen M. Moriarty
Title: Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography, Author: Yun Q. Shi
Title: Transactions on Data Hiding and Multimedia Security IV, Author: Yun Q. Shi
Title: Transactions on Data Hiding and Multimedia Security III, Author: Yun Q. Shi

Pagination Links