Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R Nemati
Title: Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / Edition 1, Author: Petra Perner
Title: Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / Edition 1, Author: Wenbo Mao
Title: Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling, Author: Giorgio Franceschetti
Title: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication / Edition 1, Author: Andreas Uhl
Title: Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / Edition 1, Author: Javier Lïpez
Title: Disaster Recovery Planning for Communic, Author: Leo A Wrobel
Title: Secure Broadcast Communication: In Wired and Wireless Networks / Edition 1, Author: Adrian Perrig
Title: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom / Edition 1, Author: David Chadwick
Title: Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / Edition 1, Author: Herbert Leitold
Title: Secure Communicating Systems: Design, Analysis, and Implementation, Author: Michael R. A. Huth
Title: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / Edition 1, Author: Antonio Lioy
Title: Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century / Edition 1, Author: Aiden A. Bruen
Title: Chaotic Secure Communication: Principles and Technologies / Edition 1, Author: Kehui Sun
Title: New Telecom Networks: Enterprises and Security / Edition 1, Author: Daniel Battu
Title: Scrambling Techniques for CDMA Communications / Edition 1, Author: Byeong Gi Lee
Title: Seven Deadliest Unified Communications Attacks, Author: Dan York
Title: Communications and Multimedia Security II / Edition 1, Author: Patrick Horster
Title: Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings / Edition 1, Author: Yongfei Han

Pagination Links