Title: Lattice-Based Cryptosystems: A Design Perspective, Author: Jiang Zhang
Title: AI-Powered Apps, Author: Kai Turing
Title: Kryptografie verständlich: Ein Lehrbuch für Studierende und Anwender, Author: Christof Paar
Title: Correspondre par e-mails...: Du bon usage en 18 points, Author: Thomas Strässle
Title: Wer andern eine E-Mail schreibt ...: Eine Anleitung in 18 Punkten, Author: Thomas Strässle
Title: Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings, Author: Cristina Alcaraz
Title: Coding Theory and Applications: 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings, Author: Ángela I. Barbero
Title: AI Ethics Now, Author: Jamal Hopper
Title: Smart Cards, Tokens, Security and Applications, Author: Keith Mayes
Title: Theoretical Foundations of Quantum Computing, Author: Daowen Qiu Ph.D.
Title: Foundations of Quantum Programming, Author: Mingsheng Ying
Title: Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers, Author: Jianying Zhou
Title: Cybersecurity for Executives: A Guide to Protecting Your Business, Author: Matthew C. Smith
Title: DESIGNS FR LINEAR CODES (2ND ED), Author: Cunsheng Ding
Title: Raw Data Is an Oxymoron, Author: Lisa Gitelman
Title: La Dévoration numérique, Author: François Forestier
Title: History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms, Author: John F. Dooley
Title: CODE BASED SECRET SHARING SCHEMES: Applied Combinatorial Coding Theory, Author: Selda Çalkavur
Title: Information Theory Tools for Visualization, Author: Min Chen
Title: Theoretische Informatik - ganz praktisch, Author: Lukas König

Pagination Links