11 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Katzenbeisser, Stefan.
Showing
1
-
11
of
11
for search:
'Katzenbeisser, Stefan.'
, query time: 0.12s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Information hiding techniques for steganography and digital watermarking
Published: Artech House, 2000
Description: xviii, 220 pages : illustrations ; 24 cm.
Located:
Loading...
Call Number:
Loading...
Book
Loading...
Place Hold
Save to List
Saved in:
2
Information hiding techniques for steganography and digital watermarking
Published: Artech House, 2000
Description: 1 online resource (xviii, 220 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Compilation for secure multi-party computation
by
Büscher, Niklas.
Published: Springer, 2017
Description: 1 online resource (98 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
Published: Springer, 2012
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Number theory and cryptography : papers in honor of Johannes Buchmann on the occasion of his 60th birthday
Published: Springer, 2013
Description: 1 online resource (xii, 281 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Transactions on data hiding and multimedia security VIII : special issue on pattern recognition for IT security
Published: Springer, 2012
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Information hiding : 11th international workshop ; revised selected papers, IH 2009, Darmstadt, Germany, June 8-10, 2009
Published: Springer, 2009
Description: 1 online resource (x, 276 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Digital watermarking : 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers
Published: Springer, 2009
Description: 1 online resource (xi, 472 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
ICT systems security and privacy protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Published: Springer, 2016
Description: 1 online resource (xiii, 414 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
10
Digital watermarking : 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, proceedings
Published: Springer, 2008
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
11
Communications and multimedia security : proceedings
Published: Springer, 2005
Description: 1 online resource (xiii, 360 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security
Data encryption (Computer science)
Computer networks Security measures
Data protection
Digital watermarking
Watermarks
Computational complexity
Computer science
Cryptography
Information technology Security measures
Internet Security measures
Number theory
Optical pattern recognition
Telecommunication systems Security measures
×
Loading...