|
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (Lecture Notes in Computer Science, 5985)
by
4.67 avg rating — 3 ratings
—
published
2010
|
|
|
Fundamentals of Computer Security
by
3.67 avg rating — 3 ratings
—
published
2003
—
5 editions
|
|
|
Theory and Practice of Cryptography Solutions for Secure Information Systems
by
3.33 avg rating — 3 ratings
—
published
2013
|
|
|
Cryptography: An Introduction to Computer Security (Advances in Computer Science Series)
by
2.50 avg rating — 2 ratings
—
published
1989
—
3 editions
|
|
|
Information Security
by
really liked it 4.00 avg rating — 1 rating
—
published
2000
—
4 editions
|
|
|
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
by
really liked it 4.00 avg rating — 1 rating
—
published
2012
|
|
|
Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (Lecture Notes in Computer Science, 1587)
by
liked it 3.00 avg rating — 1 rating
—
published
1999
—
3 editions
|
|
|
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
by
liked it 3.00 avg rating — 1 rating
—
published
2011
—
2 editions
|
|
|
Design of Hashing Algorithms (Lecture Notes in Computer Science)
by
liked it 3.00 avg rating — 1 rating
—
published
1993
—
5 editions
|
|
|
Advances in Cryptology-Auscrypt '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990 Proceedings (Lecture Notes in Computer Science)
by
liked it 3.00 avg rating — 1 rating
—
published
1990
—
4 editions
|
|
|
Number-Theoretic Methods in Cryptology: 4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24–26, 2024, Revised Selected Papers (Lecture Notes in Computer Science)
by
|
|
|
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I
by
|
|
|
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (Lecture Notes in Computer Science Book 5985)
by
0.00 avg rating — 0 ratings
|
|
|
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings (Lecture Notes in Computer Science Book 7712)
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science Book 4586)
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I (Lecture Notes in Computer Science Book 10342)
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II (Lecture Notes in Computer Science Book 10343)
by
0.00 avg rating — 0 ratings
|
|
|
[(Design of Hashing Algorithms )] [Author: Josef Pieprzyk] [Nov-1993]
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II
by
|
|
|
Information Security and Privacy
by
|
|
|
Fundamentals of Computer Security
by
|
|
|
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Privacy: First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Lecture Notes in Computer Science, 1172)
by
0.00 avg rating — 0 ratings
—
published
1996
—
2 editions
|
|
|
Advances in Cryptology - ASIACRYPT '94: 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - ... (Lecture Notes in Computer Science)
by
0.00 avg rating — 0 ratings
—
published
1995
|
|
|
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science, 4586)
by
0.00 avg rating — 0 ratings
—
published
2007
|
|
|
Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Lecture Notes in Computer Science, 1270)
by
0.00 avg rating — 0 ratings
—
published
1997
—
2 editions
|
|
|
Theory and Practice of Cryptography Solutions for Secure Information Systems
by
0.00 avg rating — 0 ratings
—
published
2013
|
|
|
Theory and Practice of Cryptography Solutions for Secure Information Systems
by
0.00 avg rating — 0 ratings
—
published
2013
—
2 editions
|
|
|
Number-Theoretic Methods in Cryptology: First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers
by
|
|
|
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III (Lecture Notes in Computer Science)
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.