9 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Vaudenay, Serge.
Showing
1
-
9
of
9
for search:
'Vaudenay, Serge.'
, query time: 0.09s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Advances in cryptology : EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 20...
Published: Springer, 2006
Description: 1 online resource (xiv, 611 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Progress in cryptology--AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings
Published: Springer, 2008
Description: 1 online resource (xi, 414 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
Published: Springer, 2012
Description: 1 online resource (xiii, 430 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
Published: Springer, 2005
Description: 1 online resource (xiii, 431 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Published: Springer, 2005
Description: 1 online resource (xi, 327 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
Published: Springer, 2012
Description: 1 online resource (xi, 424 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Applied cryptography and network security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
Published: Springer, 2014
Description: 1 online resource (xviii, 586 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Progress in Cryptology-- INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
Published: Springer, 2013
Description: 1 online resource (xviii, 319 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
Cryptology and network security : 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings
Published: Springer, 2020
Description: 1 online resource (xiii, 634 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Data encryption (Computer science)
Computer security
Computers Access control
Cryptography
Data protection
Computer networks Security measures
Cloud computing
Computer networks
Computer networks Access control
Data transmission systems Security measures
Public key cryptography
Software engineering
×
Loading...