4 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Mayes, Keith E.,
Showing
1
-
4
of
4
for search:
'Mayes, Keith E.,'
, query time: 0.06s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Smart cards, tokens, security and applications
Published: Springer, 2008
Description: 1 online resource (xxxvii, 392 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Smart cards, tokens, security and applications
Second edition.
Published: Springer, 2017
Description: 1 online resource (xxxv, 531 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings
Published: Springer, 2013
Description: 1 online resource (xviii, 794 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Secure smart embedded devices, platforms and applications
Published: Springer, 2013
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security
Smart cards Access control
Smart cards Security measures
Computer networks Security measures
Data encryption (Computer science)
Data protection
Embedded computer systems Security measures
×
Loading...