Wyniki wyszukiwania dla: Pieter Hartel
Journal of Investigative Psychology and Offender Profiling > 15 > 1 > 20 - 45
Lecture Notes in Computer Science > Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security > 112-129
Lecture Notes in Computer Science > Secure Data Management > Data Security in Open Environments > 87-100
Lecture Notes in Computer Science > Construction and Analysis of Safe, Secure, and Interoperable Smart Devices > 172-191
Lecture Notes in Computer Science > Information and Communications Security > Applied Cryptography > 345-360
Lecture Notes in Computer Science > Information and Communications Security > System Security > 294-310
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Hash Functions > 182-198
Lecture Notes in Computer Science > Secure Data Management > Secure Data Management Technologies > 114-127
Lecture Notes in Computer Science > Secure Data Management > Security and Privacy in Healthcare > 185-198
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 309-323
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Applications > 108-122
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 11: Applied Crypto II > 532-549
Lecture Notes in Computer Science > Advances in Biometrics > Others > 728-736
Lecture Notes in Computer Science > Information Security and Cryptology > Public Key and Identity Based Cryptography > 332-347
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 1-12
Lecture Notes in Computer Science > Security and Cryptography for Networks > Encryption II > 138-153
Lecture Notes in Computer Science