Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Algorithms
Computer security
Computer science
(16)
Congresses and conventions
(16)
Data encryption (Computer science)
(12)
Management information systems
(7)
more ...
Additional Suggested Topics
... within your search.
Computer communication systems
(6)
Computers and civilization
(6)
Coding theory
(4)
Artificial intelligence
(1)
Computational complexity
(1)
Computer logic
(1)
Cryptography
(1)
Database management
(1)
E-commerce
(1)
Electronic data processing
(1)
Information storage and retrieval
(1)
Neural networks (Computer science)
(1)
Pattern recognition
(1)
Quantum computers
(1)
Security systems
(1)
Software engineering
(1)
less ...
Showing
1
-
18
of
18
for search:
''
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
On the decidability of accessibility problems
by
Motwani, Rajeev
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Algorithms, architectures and information systems security /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Advances in Neural Networks - ISNN 2016 : 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Selected Areas in Cryptography – SAC 2015 : 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Privacy Technologies and Policy : Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Post-Quantum Cryptography : 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Technology and Practice of Passwords : 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedings /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Smart Card Research and Advanced Applications : 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Topics in Cryptology - CT-RSA 2016 : The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Lightweight Cryptography for Security and Privacy : 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Distributed Computing and Internet Technology : 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer security
Suggested Topics: Algorithms
Institution
KMUTT
(18)
Library
mai
(16)
Format
EBOOKS
(16)
Call Number
Q - Science
(16)
T - Technology
(1)
Author
Motwani, Rajeev
(1)
Language
English
(18)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website