Home Advanced Search

Advanced Search - Page 1

Protocols for authentication and key establishment
  • PDF
  • English
  • Year: 2011
  • Author: Boyd, Colin;Mathuria, Anish
Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2008
  • Author: Colin Boyd, Anish Mathuria
Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2003
  • Author: Colin Boyd, Anish Mathuria (auth.)
Beyond the Cyclades. Early Cycladic Sculpture in Context from Mainland Greece, the North and East Aegean
  • PDF
  • English
  • Year: 2019
  • Author: Marissa Marthari; Colin Renfrew; Michael J. Boyd
Early Cycladic Sculpture in Context
  • EPUB
  • English
  • Year: 2017
  • Author: Boyd, Michael J.;Marthari, Mariza;Renfrew, Colin
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
  • PDF
  • English
  • Year: 2013
  • Author: Chris J. Mitchell (auth.), Colin Boyd, Leonie Simpson (eds.)
Early Cycladic Sculpture in Context
  • PDF
  • English
  • Year: 2017
  • Author: Marisa Marthari (editor), Colin Renfrew (editor), Michael J. Boyd (editor)
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings
  • PDF
  • English
  • Year: 2003
  • Author: Paul C. van Oorschot (auth.), Colin Boyd, Wenbo Mao (eds.)
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
  • PDF
  • English
  • Year: 2009
  • Author: Basie von Solms (auth.), Colin Boyd, Juan González Nieto (eds.)