Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007
| Main Author: | Biryukov, Alex (Author) |
|---|---|
| Corporate Authors: | FSE 2007 (2007 : Luxembourg, Luxembourg), International Association for Cryptologic Research |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4593 |
| Subjects: |
Similar Items
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Computer security
Published: (1986)
Published: (1986)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Testing of software and communicating systems 19th IFIP TC6/WG61 International Conference, TestCom 2007, 7th international workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007 : proceedings
by: Petrenko, Alexandre
Published: (2007)
by: Petrenko, Alexandre
Published: (2007)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Hardware and software, verification and testing third International Haifa Verification Conference, HVC 2007, Haifa, Israel, October 23-25, 2007: proceedings
by: Yorav, Karen
Published: (2008)
by: Yorav, Karen
Published: (2008)
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Algorithms and data structures 10th international workshop, WADS 2007, Halifax, Canada, August 15-17, 2007 proceedings
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Software architecture : first European conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 : proceedings
by: Oquendo, Flavio , 1958-
Published: (2007)
by: Oquendo, Flavio , 1958-
Published: (2007)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
Multiagent system technologies 5th German conference, MATES 2007, Leipzig, Germany, September 24-26, 2007 proceedings
by: Petta, Paolo 1963-
Published: (2007)
by: Petta, Paolo 1963-
Published: (2007)
Computers and games 5th international conference, CG 2006, Turin, Italy, May 29-31, 2006: revised papers
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
by: Ciancarini, Paolo 1959-, et al.
Published: (2007)
Web and wireless geographical information systems 7th international symposium, W2GIS 2007, Cardiff, UK, November 28-29, 2007 : proceedings
by: Taylor, George E. (George Edward), et al.
Published: (2007)
by: Taylor, George E. (George Edward), et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Computer science -- theory and applications Second International Symposium on Computer Science in Russia, CSR 2007, Ekaterinburg, Russia, September 3-7, 2007 : proceedings
by: Diekert, Volker 1955-, et al.
Published: (2007)
by: Diekert, Volker 1955-, et al.
Published: (2007)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
New trends in software methodologies, tools and techniques
by: Fujita, Hamido, et al.
Published: (2007)
by: Fujita, Hamido, et al.
Published: (2007)
New trends in software methodologies tools and techniques
by: Fujita, Hamido, et al.
Published: (2008)
by: Fujita, Hamido, et al.
Published: (2008)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Access 2007 bible
by: Groh, Michael R. 1951-
Published: (2007)
by: Groh, Michael R. 1951-
Published: (2007)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Software engineering research, management and applications
by: Lee, R. Y. (Roger Y.)
Published: (2008)
by: Lee, R. Y. (Roger Y.)
Published: (2008)
Intelligent manufacturing system 2003 (IMS 2003) a proceedings volume from the 7th IFAC Workshop, Budapest, Hungary, 6-8 April 2003
by: Kadar, B. (Boton), et al.
Published: (2003)
by: Kadar, B. (Boton), et al.
Published: (2003)
Similar Items
-
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007) -
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007) -
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009) -
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)