Tekijä: Paul J. Wang; Gerald V. Naccarelli; Michael R. Rosen; N. A. Mark Estes; David L. Hayes; David E. Haines Kustantaja: John Wiley and Sons Ltd (2005) Saatavuus: Noin 16-19 arkipäivää
Tekijä: Patsy Wang-Iverson; Robert J. Lang; Mark YIM Kustantaja: Taylor & Francis Inc (2011) Saatavuus: | Arvioimme, että tuote lähetetään meiltä noin 1-3 viikossa
Tekijä: Jiann-Yang Hwang; Jaroslaw Drelich; Jerome P. Downey; Tao Jiang; Mark Cooksey Kustantaja: John Wiley & Sons Inc (2011) Saatavuus: Noin 16-19 arkipäivää
Tekijä: Jiann-Yang Hwang (ed.); Tao Jiang (ed.); Mark William Kennedy (ed.); Onuralp Yücel (ed.); P. Chris Pistorius (ed.); Seshadr Kustantaja: Springer (2017) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Jiann-Yang Hwang (ed.); Tao Jiang (ed.); Mark William Kennedy (ed.); Dean Gregurek (ed.); Shijie Wang (ed.); Baojun ( Zhao Kustantaja: Springer (2018) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Shilong Wang (ed.); Mark Price (ed.); Ming K. Lim (ed.); Yan Jin (ed.); Yuanxin Luo (ed.); Rui Chen (ed.) Kustantaja: Springer (2018) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Jiann-Yang Hwang (ed.); Tao Jiang (ed.); Mark William Kennedy (ed.); Onuralp Yücel (ed.); P. Chris Pistorius (ed.); Seshadr Kustantaja: Springer (2018) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Jiann-Yang Hwang (ed.); Tao Jiang (ed.); Mark William Kennedy (ed.); Dean Gregurek (ed.); Shijie Wang (ed.); Baojun ( Zhao Kustantaja: Springer (2019) Saatavuus: Noin 17-20 arkipäivää
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.