Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Algorithm Analysis and Problem Complexity
(29)
Computer Science
(29)
Computer science
Computer software
Computers and Society
Data protection
more ...
Additional Suggested Topics
... within your search.
Electronic books
(29)
Systems and Data Security
(29)
Computer Communication Networks
(26)
Data Encryption
(26)
Data encryption (Computer science)
(26)
Information Systems
(21)
Management of Computing and Information Systems
(21)
Congresses
(10)
Software engineering
(5)
Special Purpose and Application-Based Systems
(5)
Software Engineering
(3)
Math Applications in Computer Science
(2)
Optical pattern recognition
(2)
Pattern Recognition
(2)
Data Mining and Knowledge Discovery
(1)
Data mining
(1)
Information Systems Applications (incl. Internet)
(1)
less ...
Showing
1
-
20
of
29
for search:
''
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany,...
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Smart Card Research and Advanced Application 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Transactions on Data Hiding and Multimedia Security V
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Privacy Enhancing Technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings /
Published 2010
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Principles of Security and Trust First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012,...
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Transactions on Data Hiding and Multimedia Security VII
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public Key Infrastructures, Services and Applications 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Constructive Side-Channel Analysis and Secure Design Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer science
Suggested Topics: Computer software
Suggested Topics: Data protection
Suggested Topics: Computers and Society
Institution
KMUTT
(29)
Call Number
Q - Science
(15)
T - Technology
(14)
Language
English
(29)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website