[PDF] security protocol free ebooks download




View results: Search for a phrase:
ISBN Language MD5 Extension

Library Search


87 books found   ►also search"security protocol" in ,
ID Author(s) Title Publisher Year Pages Language Size Extension GET
1208675 Richard A. Demillo (ed.) Proceedings of Symposia in Applied Mathematics 029
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
0-8218-0041-8, 9780821800416
Amer Mathematical Society 1983 206 English 1 Mb djvu GET
832776 Flemming Nielson, Han Gao (auth.), Alessandro Armando, Gavin Lowe (eds.) Lecture Notes in Computer Science 6186 : Security and Cryptology
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers [1 ed.]
3642160735, 9783642160738
Springer-Verlag Berlin Heidelberg 2011 185 English 2 Mb pdf GET
1091876 Flemming Nielson, Han Gao (auth.), Alessandro Armando, Gavin Lowe (eds.) Lecture Notes in Computer Science 6186 Security and Cryptology
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers [1 ed.]
978-3-642-16073-8, 978-3-642-16074-5
Springer-Verlag Berlin Heidelberg 2011 185 English 3 Mb pdf GET
916137 Flemming Nielson, Han Gao (auth.), Alessandro Armando, Gavin Lowe (eds.) Lecture Notes in Computer Science 6186 : Security and Cryptology
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers [1 ed.]
9783642160738, 3642160735
Springer-Verlag Berlin Heidelberg 2011 185 English 2 Mb pdf GET
1033005 Ling Dong, Kefei Chen (auth.) Cryptographic Protocol: Security Analysis Based on Trusted Freshness [1 ed.]
978-3-642-24072-0, 978-3-642-24073-7
Springer-Verlag Berlin Heidelberg 2012 250 English 2 Mb pdf GET
1179610 Ling Dong, Kefei Chen (auth.) Cryptographic Protocol: Security Analysis Based on Trusted Freshness [1 ed.]
978-3-642-24072-0, 978-3-642-24073-7, 978-7-04-031331-4
Springer-Verlag Berlin Heidelberg 2012 250 English 2 Mb pdf GET
826849 Carmit Hazay, Yehuda Lindell (auth.) Information Security and Cryptography
Efficient Secure Two-Party Protocols: Techniques and Constructions [1 ed.]
3642143024, 9783642143021
Springer-Verlag Berlin Heidelberg 2010 263 English 2 Mb pdf GET
60921 Giampaolo Bella Information Security and Cryptography
Formal Correctness of Security Protocols
3540681345, 978-3-540-68134-2
Springer 2007 274 English 4 Mb pdf GET
1149182 Giampaolo Bella (auth.) Information Security and Cryptography
Formal Correctness of Security Protocols: With 62 Figures and 4 Tables [1 ed.]
978-3-540-68134-2, 978-3-540-68136-6
Springer-Verlag Berlin Heidelberg 2007 274 English 3 Mb pdf GET
813257 Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols
1607507137, 9781607507130, 9781607507147
Ios Pr Inc 2011 312 English 2 Mb pdf GET
832729 Pierpaolo Degano, Luca Viganò Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ... Computer Science Security and Cryptology) [1 ed.]
3642034586, 9783642034589
Springer 2009 233 English 3 Mb pdf GET
916619 Adedayo O. Adetoye, Atta Badii (auth.), Pierpaolo Degano, Luca Viganò (eds.) Lecture Notes in Computer Science 5511 : Security and Cryptology
Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers [1 ed.]
9783642034589, 3642034586
Springer-Verlag Berlin Heidelberg 2009 223 English 3 Mb pdf GET
1091765 Adedayo O. Adetoye, Atta Badii (auth.), Pierpaolo Degano, Luca Viganò (eds.) Lecture Notes in Computer Science 5511 Security and Cryptology
Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers [1 ed.]
978-3-642-03458-9, 978-3-642-03459-6
Springer-Verlag Berlin Heidelberg 2009 223 English 4 Mb pdf GET
587491 Adedayo O. Adetoye, Atta Badii (auth.), Pierpaolo Degano, Luca Viganò (eds.) Lecture Notes in Computer Science 5511 : Security and Cryptology
Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers [1 ed.]
3642034586, 9783642034589
Springer-Verlag Berlin Heidelberg 2009 223 English 3 Mb pdf GET
225883 Rhee Y Internet Security Cryptographic Principles Algorithms and Protocols
0-470-85285-2
Wiley 2003 426 English 4 Mb pdf GET
217869 Rhee M.Y. Internet Security. Cryptographic Principles, Algorithms and Protocols
0-470-85285-2
2003 426 English 2 Mb pdf GET
78485 M. Rhee Internet Security. Cryptographic Principles, Algorithms, Protocols
0-470-85285-2
Wiley 2003 426 English 5 Mb pdf GET
28321 Man Young Rhee Internet security: cryptographic principles, algorithms, and protocols
0470852852, 9780470852859, 9780470862469
J. Wiley 2003 426 English 4 Mb pdf GET
540703 Jonathan Katz, Yehuda Lindell Cryptography and Network Security Series
Introduction to Modern Cryptography: Principles and Protocols [1 ed.]
1584885513, 9781584885511
Chapman and Hall CRC 2007 553 English 38 Mb pdf GET
1289809 Jonathan Katz, Yehuda Lindell Chapman & Hall/CRC Cryptography and Network Security Series
Introduction to Modern Cryptography: Principles and Protocols [1 ed.]
1584885513, 9781584885511
Chapman and Hall/CRC 2007 552 English 5 Mb pdf GET
856756 Jonathan Katz, Yehuda Lindell Chapman & Hall/CRC Cryptography and Network Security Series
Introduction to Modern Cryptography: Principles and Protocols [1 ed.]
9781584885511, 1584885513
CRC 2007 553 English 10 Mb djvu GET
1491246 Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe, Bill Roscoe Modelling & Analysis of Security Protocols
0201674718, 9780201674712
Addison-Wesley Professional 2000 320 English 1 Mb pdf GET
947311 Cas Cremers, Sjouke Mauw (auth.) Information Security and Cryptography
Operational Semantics and Verification of Security Protocols [1 ed.]
978-3-540-78635-1, 978-3-540-78636-8
Springer-Verlag Berlin Heidelberg 2012 174 English 4 Mb pdf GET
745153 Nouha Oualha, Yves Roudier Computer Science, Technology and Applications
Peer-To-Peer Storage: Security and Protocols
9781611225631, 1616681993, 9781616681999
Nova Science Publishers 2010 76 English 1 Mb pdf GET
946353 Colin Boyd, Anish Mathuria (auth.) Information Security and Cryptography
Protocols for Authentication and Key Establishment [1 ed.]
978-3-642-07716-6, 978-3-662-09527-0
Springer-Verlag Berlin Heidelberg 2003 321 English 9 Mb pdf GET
  ►

If no results, Please search security protocol here Again

 Левин Б. Р.
Friedel Hartmann
Боголюбов Н.Н.
Эйлер Леонард, Под редакцией академика В.И.Смирнова. , Составители: Т.Н.Кладо. Ю.X.Копелевич, Т.А.Лукина
Kaplansky I.
Demazure M., Gabriel P.
Frits Beukers (auth.), Bas Edixhoven, Jan-Hendrik Evertse (eds.)
Couturat L.
Erich Grädel, Phokion G. Kolaitis, Leonid Libkin, Maarten Marx, Joel Spencer, Moshe Y. Vardi, Yde Venema, Scott Weinstein
Атья М., Макдональд И.
Заманский М.
Jean Cousteix, Jacques Mauss
Нечепуренко М.И.


Katznelson Y.
Геронимус Я.Л.
Lars Hörmander
Lars Hörmander
Manturov V.

decodingcontrol systemsrouting protocolconfidence intervalcorrelation functiongel permeation chromatographyhazardsresidual stresspalaeobiologycultural differencescell linedata analysisliquid metalactuatorsinnate immunityluminositydiffusion processmark to market accountingtrusted third partythreadspectrumhartree focksimulated annealingdistributed generationharmonic analysisdata miningsynapsesantigenslawsymmetry breakingmathematical modelshyperspectral imaginghigh energy astrophysicsremotely operated vehiclesnuclear magnetic resonancesocial networkgeneratorsassessmentmedical diagnosticstransition statethin filmmozartprivate equityperoxidaseinformation extractiondiffusionmicromechanicscytochrome oxidase