Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Algorithm Analysis and Problem Complexity
(23)
Coding and Information Theory
(23)
Coding theory
Computer Science
(23)
Computer science
Computer software
more ...
Additional Suggested Topics
... within your search.
Data Encryption
(23)
Data encryption (Computer science)
Electronic books
(21)
Data protection
(16)
Systems and Data Security
(16)
Computer Communication Networks
(14)
Computational complexity
(8)
Discrete Mathematics in Computer Science
(8)
Information Systems
(7)
Management of Computing and Information Systems
(7)
Congresses
(6)
Data Structures, Cryptology and Information Theory
(5)
Data structures (Computer science)
(5)
Software Engineering
(3)
Software engineering
(3)
Math Applications in Computer Science
(2)
Computer Appl. in Administrative Data Processing
(1)
Electronic book
(1)
Information systems
(1)
Mathematics of Computing
(1)
e-Commerce/e-business
(1)
less ...
Showing
1
-
20
of
23
for search:
''
, query time: 0.05s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trustworthly Global Computing 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Sequences and Their Applications เนโฌโ€ SETA 2010 6th International Conference, Paris, France, September 13-17, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Transactions on Computational Science XI Special Issue on Security in Computing, Part II /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trustworthy Global Computing 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Sequences and Their Applications – SETA 2012 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings /
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers /
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings /
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer science
Suggested Topics: Computer software
Suggested Topics: Data encryption (Computer science)
Suggested Topics: Coding theory
Institution
KMUTT
(23)
Library
mai
(1)
Format
EBOOKS
(1)
Call Number
Q - Science
(22)
T - Technology
(1)
Language
English
(23)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website