Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Coding and Information Theory
Coding theory
(8)
Computer Science
(8)
Computer science
Data Encryption
(8)
Data encryption (Computer science)
(8)
more ...
Additional Suggested Topics
... within your search.
Data protection
Electronic books
(8)
Systems and Data Security
(8)
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
(4)
Congresses
(4)
Information Systems
(4)
Information systems
(4)
Management of Computing and Information Systems
(4)
Computers and Society
(2)
Algorithm Analysis and Problem Complexity
(1)
Computer Communication Networks
(1)
Computer software
(1)
Data Structures, Cryptology and Information Theory
(1)
Data structures (Computer science)
(1)
Information Systems Applications (incl. Internet)
(1)
Operating Systems
(1)
Operating systems (Computers)
(1)
less ...
Showing
1
-
8
of
8
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings /
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer science
Suggested Topics: Data protection
Suggested Topics: Coding and Information Theory
Suggested Topics: e-Commerce/e-business
Institution
KMUTT
(8)
Call Number
Q - Science
(8)
Language
English
(8)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website