|
|
On the Move to Meaningful Internet Systems: OTM 2013 Conferences
by Meersman, Robert.
Publication:
. XXX, 775 p. 269 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Bitsch, Friedemann.
Publication:
. XVI, 304 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Communication Networking
by Bauschert, Thomas.
Publication:
. XII, 322 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Lightweight Cryptography for Security and Privacy
by Avoine, Gildas.
Publication:
. X, 143 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems - CHES 2013
by Bertoni, Guido.
Publication:
. XIV, 490 p. 172 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermaking
by Shi, Yun Q.
Publication:
. XX, 532 p. 245 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2013
by Canetti, Ran.
Publication:
. XVIII, 558 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2013
by Canetti, Ran.
Publication:
. XVIII, 590 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Wang, G. Alan.
Publication:
. X, 117 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interactive Theorem Proving
by Blazy, Sandrine.
Publication:
. XII, 498 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Aspects of Information Security, Privacy, and Trust
by Marinos, Louis.
Publication:
. XX, 378 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|