Ejemplares similares: Pairing-Based Cryptography :
- Cryptography and Security Systems : Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : Proceedings /
- Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : Proceedings /
- Information Security and Cryptology, ICISC 2013 : 16th International Conference, Seoul, Korea, November 27–29, 2013 : Revised Selected Papers /
- Information Security Applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19–21, 2013 : Revised Selected Papers /
- Theory of Cryptography : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : Proceedings /
- Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28–30, 2013 : Proceedings /
Tópico: Firewalls
Tópico: Protección de Datos
- Internet security for business /
- The End of Privacy : How Total Surveillance is Becoming a Reality /
- Cyberethics : Morality and Law in Cyberspace /
- Técnicas criptográficas de protección de datos /
- Network and Internetworking Security : Principles and Practice /
- Cryptography and Network Security : Principles and Practice/