Home > Using Identity-Based Cryptography in Mobile Applications
"Using Identity-Based Cryptography in Mobile Applications" - similar Books and Chapters
Showing 1 to 20 of 100 entries
Book | Author(s) | Year | Publisher |
2009 | IOS Press | ||
2012 | Routledge | ||
2011 | Springer Berlin Heidelberg | ||
c2007. | IRM Press, | ||
2008 | Birkhäuser Basel | ||
2020 | John Wiley & Sons | ||
1997 | Naval Postgraduate School;Available from National Technical Information Service | ||
1st ed. 2020 | Springer Nature Singapore | ||
2014 | Springer International Publishing | ||
2016 | Routledge | ||
1st ed. 2018 | Springer Nature Singapore | ||
2010 | Focal Press | ||
1st ed. 2016 | Springer Berlin Heidelberg | ||
2000 | Technische Universiteit Eindhoven | ||
2013 | Bookboon | ||
2002 | Springer US | ||
1st ed. 2022 | Springer International Publishing | ||
[1996], ©1996. | World Scientific, | ||
1st ed. 2020 | Springer International Publishing | ||
2014 | Springer International Publishing | ||
Boook | Author(s) | Year | Publisher |
Showing 1 to 20 of 100 entries
Chapter | Author(s) | Book | Book Authors | Year | Publisher |
2014 | Springer International Publishing | ||||
2013 | Springer Berlin Heidelberg | ||||
2012 | Routledge | ||||
2007 | Springer Berlin Heidelberg | ||||
2009 | Springer Berlin Heidelberg | ||||
2007 | Springer Berlin Heidelberg | ||||
2012 | Springer Berlin Heidelberg | ||||
2012 | Routledge | ||||
2022 | World Scientific Pub Co Inc | ||||
2010 | Sams Publishing | ||||
2017;2015 | Sybex; John Wiley & Sons | ||||
2010 | Sams | ||||
2007 | Springer Berlin Heidelberg | ||||
2009 | IOS Press | ||||
2019 | Routledge | ||||
2005 | Springer Berlin Heidelberg | ||||
2004 | Springer Berlin Heidelberg | ||||
2014 | Springer Berlin Heidelberg | ||||
1st ed. 2021 | Springer Nature Singapore | ||||
2004 | Springer Berlin Heidelberg | ||||
Chapter | Author(s) | Book | Book Authors | Year | Publisher |