E-book Search
E-Book Title Author Publisher ISBN Copyright Year Status
Information Security Eiji OkamotoGeorge DavidaMasahiro Mambo Springer _ 1998
Information Security Juan A. GarayArjen K. LenstraMasahiro MamboRen� Peralta Springer _ 2007
Information Security Pierangela SamaratiMoti YungFabio MartinelliClaudio A. Ardagna Springer _ 2009
Information Security Xuejia LaiJianying ZhouHui Li Springer _ 2011
Information Security Gerhard GoosJuris HartmanisJan van LeeuwenJosef PieprzykJennifer SeberryEiji Okamoto Springer _ 2000
Information Security and Cryptology Helger LipmaaMoti YungDongdai Lin Springer _ 2006
Information Security and Cryptology Feng BaoMoti YungDongdai LinJiwu Jing Springer _ 2010
Information Security and Cryptology Moti YungPeng LiuDongdai Lin Springer _ 2009
Information Security and Cryptology Dengguo FengDongdai LinMoti Yung Springer _ 2005
Information Security and Cryptology Dingyi PeiMoti YungDongdai LinChuankun Wu Springer _ 2008
Information Security and Cryptology Chuan-Kun WuMoti YungDongdai Lin Springer 9783642347047 2012
Information Security and Cryptology Xuejia LaiMoti YungDongdai Lin Springer _ 2011
Information Security and Cryptology - ICISC 2003 Jong-In LimDong-Hoon Lee Springer _ 2004
Information Security and Cryptology - ICISC 2005 Dong Ho WonSeungjoo Kim Springer _ 2006
Information Security and Cryptology - ICISC 2007 Kil-Hyun NamGwangsoo Rhee Springer _ 2007
Information Security and Cryptology - ICISC 2010 Kyung-Hyune RheeDaeHun Nyang Springer _ 2011
Information Security and Cryptology - ICISC 2011 Howon Kim Springer 9783642319129 2012
Information Security and Cryptology - ICISC�99 JooSeok Song Springer _ 2000
Information Security and Cryptology � ICISC 2004 Choon-sik ParkSeongtaek Chee Springer _ 2005
Information Security and Cryptology � ICISC 2006 Min Surp RheeByoungcheon Lee Springer _ 2006
Information Security and Cryptology � ICISC 2008 Pil Joong LeeJung Hee Cheon Springer _ 2009
Information Security and Cryptology � ICISC 2000 Dongho Won Springer _ 2001
Information Security and Cryptology � ICISC 2001 Kwangjo Kim Springer _ 2002
Information Security and Cryptology � ICISC 2002 Pil Joong LeeChae Hoon Lim Springer _ 2003
Information Security and Privacy Josef PieprzykRei Safavi-NainiJennifer Seberry Springer _ 1999

Contact Us