Title: Scrambling Techniques for CDMA Communications / Edition 1, Author: Byeong Gi Lee
Title: New Telecom Networks: Enterprises and Security / Edition 1, Author: Daniel Battu
Title: Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century / Edition 1, Author: Aiden A. Bruen
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Chaotic Secure Communication: Principles and Technologies / Edition 1, Author: Kehui Sun
Title: Communications and Multimedia Security II / Edition 1, Author: Patrick Horster
Title: Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling, Author: Giorgio Franceschetti
Title: Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / Edition 1, Author: Javier López
Title: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom / Edition 1, Author: David Chadwick
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication / Edition 1, Author: Andreas Uhl
Title: Secure Broadcast Communication: In Wired and Wireless Networks / Edition 1, Author: Adrian Perrig
Title: Disaster Recovery Planning for Communic, Author: Leo A Wrobel
Title: Secure Communicating Systems: Design, Analysis, and Implementation, Author: Michael R. A. Huth
Title: Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies, Author: Babak Akhgar
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Ultimate Telecommunications Security Survey, Author: James L Schaub
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / Edition 1, Author: Wenbo Mao
Title: Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings / Edition 1, Author: Yongfei Han

Pagination Links