Showing
1 - 9
results of
9
for search '
Schneider, Steve.
'
Skip to content
Toggle navigation
SEAL
Language
English
Malay
中文(简体)
தமிழ்
اللغة العربية
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Accession No
Control No
Find
Advanced
Author
Schneider, Steve.
Showing
1 - 9
results of
9
for search '
Schneider, Steve.
', query time: 0.96s
Results per page
10
20
40
60
80
100
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
List
Grid
1
Integrated Formal Methods 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings / edited by Nadia Polikarpova, Steve Schneider.
Published 2017
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
2
Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve...
Published 2016
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
3
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / edited by Kazue Sako, Steve Schn...
Published 2019
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
4
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / edited by Kazue Sako, Steve Sch...
Published 2019
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
5
Computer Security – ESORICS 2020 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I / edited by Liqun...
Published 2020
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
6
Computer Security – ESORICS 2020 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II / edited by Liqu...
Published 2020
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
7
E-Voting and Identity 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings / edited by James Heather, Steve Schneider, Vanessa Teague.
Published 2013
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
8
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings / edited by Liqun Chen, Mark Manulis, Steve Schneider.
Published 2018
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
9
Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers / edited by Theo Dimitrakos, Fa...
Published 2007
Other Authors:
';
“
...
Schneider
,
Steve
....
”
Call Number:
Loading...
Located:
Loading...
Get full text
Show QR Code
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Computer security
Systems and Data Security
Application software
Computer Communication Networks
Computer communication systems
Computers
Software engineering
Computer Systems Organization and Communication Networks
Computer organization
Information Systems Applications (incl. Internet)
Software Engineering
Artificial Intelligence
Artificial intelligence
Computers and Society
Computers and civilization
Computing Milieux
Cryptology
Data encryption (Computer science)
Special Purpose and Application-Based Systems
Special purpose computers
Computer networks
Computer science
Management information systems
Management of Computing and Information Systems
Mobile and Network Security
Security measures
Theory of Computation
Computer Appl. in Administrative Data Processing
Computer logic
Data Structures and Information Theory
×
Loading...