Applied Cryptography and Network Security Workshops المزيد من كتب Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang & Yury Zhauniarovich

Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication
٢٠١١
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
٢٠٢٢
Security and Trust Management Security and Trust Management
٢٠٢١
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
٢٠٢١
Information and Communications Security Information and Communications Security
٢٠٢٠
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
٢٠٢٠
Applied Cryptography and Network Security Applied Cryptography and Network Security
٢٠٢٠
Applied Cryptography and Network Security Applied Cryptography and Network Security
٢٠٢٠
Information and Communications Security Information and Communications Security
٢٠٢٠
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
٢٠١٩
Computer Security Computer Security
٢٠١٨
Computer Security Computer Security
٢٠١٨
Information Security Information Security
٢٠١٧
Protecting Mobile Networks and Devices Protecting Mobile Networks and Devices
٢٠١٦
Information Security and Cryptology Information Security and Cryptology
٢٠١٥
Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
٢٠٠٨
Applied Cryptography and Network Security Applied Cryptography and Network Security
٢٠١٠