3 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Stebila, Douglas.
Showing
1
-
3
of
3
for search:
'Stebila, Douglas.'
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Information security and privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29-July 1, 2015, Proceedings
Published: Springer, 2015
Description: 1 online resource (xi, 510 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Protocols for authentication and key establishment
Second edition.
by
Boyd, Colin, 1959-
Published: Springer, 2020
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Selected areas in cryptography -- SAC 2019 : 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers
Published: Springer, 2020
Description: 1 online resource (xv, 715 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Data encryption (Computer science)
Computer networks Security measures
Computer security
Computer network protocols
Public key infrastructure (Computer security)
×
Loading...