Your search returned 8 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Public key cryptography : PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings / Ronald Cramer, ed. by Series: Lecture notes in computer science ; 4939. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2008
Other title:
  • PKC 2008
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
2.
Advances in cryptology -- EUROCRYPT 2005 : 24th annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005 : proceedings / Ronald Cramer (ed.). by Series: Lecture notes in computer science ; 3494.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2005
Other title:
  • EUROCRYPT 2005
  • 24th annual International Conference on the Theory and Applications of Cryptographic Techniques
  • Twenty-fourth annual International Conference on the Theory and Applications of Cryptographic Techniques
  • Annual International Conference on the Theory and Applications of Cryptographic Techniques
  • International Conference on the Theory and Applications of Cryptographic Techniques
Online resources:
Availability: Items available for loan: e-Library (1).
3.
Information theoretic security : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings / Adam Smith (ed.). by Series: Lecture notes in computer science ; 7412. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin ; New York : Springer, [2012]Copyright date: ©2012
Other title:
  • International Conference of Information-theoretic Security 2012
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
4.
5.
Controlled natural language : second International Workshop, CNL 2010, Marettimo Island, Italy, September 13-15, 2010. Revised papers / Michael Rosner, Norbert E. Fuchs (eds.). by Series: Lecture notes in computer science. Lecture notes in artificial intelligence ; ; 7175. | Lecture notes in computer science | LNCS sublibrary. SL 7, Artificial intelligence.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • CNL 2012
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
6.
7.
Theory of cryptography : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings / Daniele Micciancio (ed.). by Series: Lecture notes in computer science ; 5978. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 12990504
Publication details: Berlin ; New York : Springer, ©2010
Other title:
  • TCC 2010
Online resources:
Availability: Items available for loan: e-Library (1).
8.
Pages

Powered by Koha