|
Malicious Cryptography: Exposing Crytovirology
by
3.63 avg rating — 41 ratings
—
published
2004
—
8 editions
|
|
|
Applied Cryptography and Network Security
by
3.67 avg rating — 6 ratings
—
published
2005
—
5 editions
|
|
|
Applied Cryptography and Network Security
by
really liked it 4.00 avg rating — 2 ratings
—
published
2008
—
2 editions
|
|
|
Security and Cryptography for Networks
by
liked it 3.00 avg rating — 2 ratings
—
published
2008
|
|
|
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science, 5037)
by
it was amazing 5.00 avg rating — 1 rating
—
published
2008
—
2 editions
|
|
|
Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Lecture Notes in Computer Science, 7459)
by
really liked it 4.00 avg rating — 1 rating
—
published
2012
—
2 editions
|
|
|
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part ... Telecommunications Engineering Book 398)
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science)
by
0.00 avg rating — 0 ratings
|
|
|
Public Key Cryptography - PKC 2006
by
0.00 avg rating — 0 ratings
|
|
|
Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science Book 14299)
by
0.00 avg rating — 0 ratings
|
|
|
Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science Book 14299)
by
0.00 avg rating — 0 ratings
|
|
|
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (Lecture Notes in Computer Science Book 9565)
by
0.00 avg rating — 0 ratings
|
|
|
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers (Lecture Notes in Computer Science Book 9473)
by
0.00 avg rating — 0 ratings
|
|
|
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. ... Notes in Computer Science Book 3958)
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science Book 5487)
by
0.00 avg rating — 0 ratings
|
|
|
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Lecture Notes in Computer Science, 4521)
by
0.00 avg rating — 0 ratings
—
published
2007
|
|
|
Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers (Lecture Notes in Computer Science Book 12612)
by
|
|
|
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
by
0.00 avg rating — 0 ratings
|
|
|
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
by
0.00 avg rating — 0 ratings
|
|
|
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
by
|
|
|
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
by
|
|
|
Drm 2003: Proceedings of the Third ACM Workshop on Digital Rights Management: Washington, DC, USA
by
0.00 avg rating — 0 ratings
|
|
|
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science)
by
0.00 avg rating — 0 ratings
—
published
2009
|
|
|
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, ... (Lecture Notes in Computer Science, 3958)
by
0.00 avg rating — 0 ratings
—
published
2006
—
2 editions
|
|
|
Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science, 2908)
by
0.00 avg rating — 0 ratings
—
published
2004
|
|
|
Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings (Lecture Notes in Computer Science, 2442)
by
0.00 avg rating — 0 ratings
—
published
2002
—
3 editions
|
|
|
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science Book 11464)
by
0.00 avg rating — 0 ratings
|
|
|
Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings (Lecture Notes in Computer Science Book 9955)
by
0.00 avg rating — 0 ratings
|
|
|
Data Security and Privacy Protection: Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part II (Lecture Notes in Computer Science Book 15216)
by
0.00 avg rating — 0 ratings
|
|
|
Data Security and Privacy Protection: Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I (Lecture Notes in Computer Science Book 15215)
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.