angelos d keromytis

Grid   List

  1. Ebook
    Sofort lieferbar
    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibilit...
    53,49 €
    Alle Preise inkl. MwSt
  2. Ebook
    Sofort lieferbar
    CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption a...
    96,29 €
    Alle Preise inkl. MwSt
  3. Ebook
    Sofort lieferbar
    Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider attack problem as viewed by the financial industry. This edited volume is based on the first worksho...
    96,29 €
    Alle Preise inkl. MwSt
  4. Ebook
    Sofort lieferbar
    This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, Fe...
    53,49 €
    Alle Preise inkl. MwSt
  5. Ebook
    Sofort lieferbar
    This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. T...
    53,49 €
    Alle Preise inkl. MwSt
  6. Ebook
    Sofort lieferbar
    The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association...
    96,29 €
    Alle Preise inkl. MwSt
  7. Ebook
    Sofort lieferbar
    This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
    53,49 €
    Alle Preise inkl. MwSt
  8. Buch
    Bezug 11-15
    Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the fir...
    125,28 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  9. Taschenbuch
    Bezug 11-15
    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibi...
    64,23 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  10. Taschenbuch
    Bezug 11-15
    The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association...
    106,99 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  11. Taschenbuch
    Bezug 11-15
    This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, Fe...
    53,49 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  12. Taschenbuch
    Bezug 11-15
    Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the fir...
    125,28 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  1. 1
  2. 2
<%--for search--%>