[{"item_id":"17976","item_name":"Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 2830, 2022, Proceedings - Lecture Notes in Computer Science 13512","item_brand":"Jung Hee Cheon, Thomas Johansson","item_category":"Language & Reference","list":"Network hardware","price":"8.40","variant":"","quantity":1},{"item_id":"18024","item_name":"Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaao, March 48, 2024, Revised Selected Papers, Part II - Lecture Notes in Computer Science 14745","item_brand":"Jeremy Clark, Elaine Shi","item_category":"Computing & Internet","list":"Network hardware","price":"41.99","variant":"","quantity":1},{"item_id":"18036","item_name":"Financial Cryptography and Data Security. FC 2025 International Workshops: CoDecFin, FinTeAchin, VOTING, Miyakojima, Japan, April 18, 2025, Revised Selected Papers, Part II - Lecture Notes in Computer Science","item_brand":"","item_category":"Language & Reference","list":"Network hardware","price":"45.49","variant":"","quantity":1},{"item_id":"17965","item_name":"Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 386","item_brand":"Bo Chen, Xinyi Huang","item_category":"Computing & Internet","list":"Network hardware","price":"36.36","variant":"","quantity":1},{"item_id":"17970","item_name":"Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lbeck, Germany, November 1112, 2021, Revised Selected Papers - Security and Cryptology 13173","item_brand":"","item_category":"Computing & Internet","list":"Network hardware","price":"38.49","variant":"","quantity":1},{"item_id":"17978","item_name":"Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 710, 2022, Proceedings, Part III - Lecture Notes in Computer Science 13749","item_brand":"Eike Kiltz, Vinod Vaikuntanathan","item_category":"Language & Reference","list":"Network hardware","price":"31.40","variant":"","quantity":1},{"item_id":"17980","item_name":"Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings - Communications in Computer and Information Science 1747","item_brand":"Abderrahmane Nitaj, Karim Zkik","item_category":"Computing & Internet","list":"Network hardware","price":"31.40","variant":"","quantity":1},{"item_id":"18023","item_name":"Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaao, March 48, 2024, Revised Selected Papers, Part I - Lecture Notes in Computer Science 14744","item_brand":"Jeremy Clark, Elaine Shi","item_category":"Computing & Internet","list":"Network hardware","price":"41.99","variant":"","quantity":1},{"item_id":"18035","item_name":"Financial Cryptography and Data Security. FC 2025 International Workshops: CAAW 2025 and WTSC 2025, Miyakojima, Japan, April 18, 2025, Revised Selected Papers, Part I - Lecture Notes in Computer Science","item_brand":"","item_category":"Language & Reference","list":"Network hardware","price":"45.49","variant":"","quantity":1},{"item_id":"18054","item_name":"Security and Cryptography: 20th International Conference, SECRYPT 2023, Rome, Italy, July 1012, 2023, and 21st International Conference, SECRYPT 2024, Dijon, France, July 8-10, 2024, Revised Selected Papers - Communications in Computer and Information Science","item_brand":"Pierangela Samarati, Sabrina De Capitani di Vimercati","item_category":"Computing & Internet","list":"Network hardware","price":"55.99","variant":"","quantity":1},{"item_id":"18114","item_name":"Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010 - Security and Cryptology 6150","item_brand":"Holger Giese","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18116","item_name":"Critical Information Infrastructures Security: 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers - Security and Cryptology 6027","item_brand":"Erich Rome, Robin Bloomfield","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18123","item_name":"Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings - Security and Cryptology 6307","item_brand":"Somesh Jha, Robin Sommer, Christian Kreibich","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18124","item_name":"Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers - Security and Cryptology 6186","item_brand":"Alessandro Armando, Gavin Lowe","item_category":"Language & Reference","list":"Network hardware","price":"38.49","variant":"","quantity":1},{"item_id":"18125","item_name":"Provable Security: 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings - Security and Cryptology 6402","item_brand":"Kaoru Kurosawa","item_category":"Language & Reference","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18128","item_name":"Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers - Security and Cryptology 6391","item_brand":"Fabio Martinelli, Bart Preneel","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18133","item_name":"Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 - Security and Cryptology 6503","item_brand":"Somesh Jha, Anish Mathuria","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18138","item_name":"Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers - Security and Cryptology 6829","item_brand":"Kyung-Hyune Rhee, DaeHun Nyang","item_category":"Computing & Internet","list":"Network hardware","price":"31.49","variant":"","quantity":1},{"item_id":"18139","item_name":"Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings - Security and Cryptology 7043","item_brand":"Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu","item_category":"Language & Reference","list":"Network hardware","price":"31.49","variant":"","quantity":1}]
Network hardware Books
Showing 1 – 18 of 19 results