Home Advanced Search

Advanced Search - Page 1

Protocols for authentication and key establishment
  • PDF
  • English
  • Year: 2011
  • Author: Boyd, Colin;Mathuria, Anish
Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2008
  • Author: Colin Boyd, Anish Mathuria
Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2003
  • Author: Colin Boyd, Anish Mathuria (auth.)
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
  • PDF
  • English
  • Year: 2011
  • Author: Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.)
Beyond the Cyclades. Early Cycladic Sculpture in Context from Mainland Greece, the North and East Aegean
  • PDF
  • English
  • Year: 2019
  • Author: Marissa Marthari; Colin Renfrew; Michael J. Boyd
Early Cycladic Sculpture in Context
  • EPUB
  • English
  • Year: 2017
  • Author: Boyd, Michael J.;Marthari, Mariza;Renfrew, Colin
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
  • PDF
  • English
  • Year: 2013
  • Author: Chris J. Mitchell (auth.), Colin Boyd, Leonie Simpson (eds.)
Packet Analysis with Wireshark
  • PDF
  • English
  • Year: 2015
  • Author: Anish Nath
Packet Analysis with Wireshark
  • EPUB
  • English
  • Year: 2015
  • Author: Anish Nath