Eitemau Tebyg: Information Security and Cryptology :
- Advances in Cryptology – ASIACRYPT 2013 /
- Advances in Cryptology - ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014 : Proceedings : Part II /
- Information Security and Cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : Revised Selected Papers /
- Advances in Cryptology – EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : Proceedings /
- Advances in Cryptology - ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014 : Proceedings : Part I /
- Advances in Cryptology – CRYPTO 2013 /
Pwnc: Firma Digital
- E-Money : la importancia de definir el medio de pago en el e-commerce /
- Falsedades documentales por computadora /
- Advances in Cryptology – ASIACRYPT 2013 /
- Information Security and Cryptology : ICISC 2012, 15th International Conference, Seoul, Korea, November 28-30, 2012 : Revised Selected Papers /
- Introduction to Cryptography with Maple /
- Descubriendo el bitcoin : cómo funciona, cómo comprar, invertir, desinvertir... /
Pwnc: Identidad Personal - Aspectos Tecnológicos
- 3D Biometrics : Systems and Applications /
- Information Security and Cryptology : ICISC 2012, 15th International Conference, Seoul, Korea, November 28-30, 2012 : Revised Selected Papers /
- Introduction to Cryptography with Maple /
- Handbook of Iris Recognition /
- Educar y educarse entre pantallas : ¡todo el día con el móvil! /