Home
Latest Books
Advanced Search
How to Download
Home
Advanced Search
Advanced Search
- Page 1
Title
Author
Publisher
ISBN
Language
English
Russian
Ukrainian
German
French
Italian
Japanese
Spanish
Portuguese
Latin
Czech
Bulgarian
Russian (Old)
Abkhaz
Afar
Afrikaans
Akan
Albanian
Amharic
Arabic
Aragonese
Armenian
Assamese
Avaric
Avestan
Aymara
Azerbaijani
Bambara
Bashkir
Basque
Belarusian
Bengali
Bihari
Bislama
Bosnian
Breton
Burmese
Catalan
Chamorro
Chechen
Chichewa
Chinese
Chuvash
Cornish
Corsican
Cree
Croatian
Danish
Divehi
Dutch
Dzongkha
Esperanto
Estonian
Ewe
Faroese
Fijian
Finnish
Fula
Galician
Ganda
Georgian
Greek
Guaraní
Gujarati
Haitian
Hausa
Hebrew
Herero
Hindi
Hiri Motu
Hungarian
Icelandic
Ido
Igbo
Indonesian
Interlingua
Interlingue
Inuktitut
Inupiaq
Irish
Javanese
Kalaallisut
Kannada
Kanuri
Kashmiri
Kazakh
Khmer
Kikuyu
Kinyarwanda
Kirundi
Komi
Kongo
Korean
Kurdish
Kwanyama
Kyrgyz
Lao
Latvian
Limburgish
Lingala
Lithuanian
Luba-Katanga
Luxembourgish
Macedonian
Malagasy
Malay
Malayalam
Maltese
Manx
Marathi
Marshallese
Mongolian
Māori
Nauru
Navajo
Ndonga
Nepali
North Ndebele
Northern Sami
Norwegian
Norwegian Bokmål
Norwegian Nynorsk
Nuosu
Occitan
Ojibwe
Old Church Slavonic
Oriya
Oromo
Ossetian
Panjabi
Pashto
Persian
Polish
Pāli
Quechua
Romanian
Romansh
Samoan
Sango
Sanskrit
Sardinian
Scottish Gaelic
Serbian
Shona
Sindhi
Sinhala
Slovak
Slovene
Somali
South Ndebele
Southern Sotho
Sundanese
Swahili
Swati
Swedish
Tagalog
Tahitian
Tajik
Tamil
Tatar
Telugu
Thai
Tibetan Standard
Tigrinya
Tonga
Tsonga
Tswana
Turkish
Turkmen
Twi
Uighur
Urdu
Uzbek
Venda
Vietnamese
Volapük
Walloon
Welsh
Western Frisian
Wolof
Xhosa
Yiddish
Yoruba
Zhuang
Zulu
Extension
pdf
djvu
epub
doc
mobi
rar
zip
azw3
Year
Submit
Secure Multi-Party Non-Repudiation Protocols and Applications
PDF
English
Year: 2009
Author: José A. Onieva, Javier Lopez, Jianying Zhou (auth.)
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
PDF
English
Year: 2018
Author: Javier Lopez, Jianying Zhou, Miguel Soriano
Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings
PDF
English
Year: 2005
Author: Kenji Imamoto, Jianying Zhou, Kouichi Sakurai (auth.), Sihan Qing, Wenbo Mao, Javier López, Guilin Wang (eds.)
Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings
PDF
English
Year: 2012
Author: Fengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.)
Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings
PDF
English
Year: 2001
Author: Claus Peter Schnorr (auth.), Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
PDF
English
Year: 2012
Author: Feng Hao, Dylan Clarke (auth.), Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
PDF
English
Year: 2012
Author: Feng Hao, Dylan Clarke (auth.), Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Proceedings
PDF
English
Year: 2004
Author: Johannes Blömer, Alexander May (auth.), Feng Bao, Robert Deng, Jianying Zhou (eds.)
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings
PDF
English
Year: 2006
Author: Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.)
Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
PDF
English
Year: 2014
Author: Xinyi Huang, Jianying Zhou (eds.)
1
2
3
4
5
...
19121
search