Skip to main content
Search
Connect
Kstocker
@kstocker
0
followers
Follow
Videos
Playlists
Most recent
Most recent
Most viewed
0:08
Read Amongst Mathematicians: Teaching and Learning Mathematics at University Level (Mathematics
9 years ago
0:05
Read Intelligent Knowledge-Based Systems: Business and Technology in the New Millennium Ebook
9 years ago
0:05
Read Operations Research in Space and Air (Applied Optimization) PDF Free
9 years ago
0:06
Read Intelligence and Security Informatics: Techniques and Applications (Studies in Computational
9 years ago
0:05
Read Permutation Complexity in Dynamical Systems: Ordinal Patterns Permutation Entropy and
9 years ago
0:08
Download Handbook of Research on Emerging Developments in Data Privacy Ebook Free
9 years ago
0:07
Read Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques
9 years ago
0:08
Read Methods and Models in Transport and Telecommunications: Cross Atlantic Perspectives (Advances
9 years ago
0:05
Read Group Theoretic Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)
9 years ago
0:05
Download Evolutionary Multiobjective Optimization: Theoretical Advances and Applications (Advanced
9 years ago
0:08
Read Data Management for Mobile Computing (Advances in Database Systems) PDF Free
9 years ago
0:05
Read System-on-Chip Architectures and Implementations for Private-Key Data Encryption Ebook
9 years ago
0:05
Read Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information
9 years ago
0:06
Download Cryptographic Protocol: Security Analysis Based on Trusted Freshness Ebook Free
9 years ago
0:08
Download Digital Signatures (Advances in Information Security) Ebook Online
9 years ago
0:07
Read Network Security and Cryptography Ebook Free
9 years ago
0:05
Download Protecting Information: From Classical Error Correction to Quantum Cryptography PDF
9 years ago
0:08
Download Concrete and Abstract Voronoi Diagrams (Lecture Notes in Computer Science) PDF Free
9 years ago
0:05
Read Primality Testing in Polynomial Time: From Randomized Algorithms to PRIMES Is in P (Lecture
9 years ago
0:07
Read Information Hiding: Third International Workshop IH'99 Dresden Germany September 29 -
9 years ago
0:05
Read QC-LDPC Code-Based Cryptography (SpringerBriefs in Electrical and Computer Engineering)
9 years ago
0:06
Read Trusted Computing - Challenges and Applications: First International Conference on Trusted
9 years ago
0:07
Read Information Hiding (Artech House Computer Security Series) Ebook Free
9 years ago
0:05
Read Handbook of Data Compression PDF Free
9 years ago
0:08
Read Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems PDF
9 years ago
0:05
Read Chaos-based Cryptography: Theory Algorithms and Applications (Studies in Computational
9 years ago
0:06
Download Computational Number Theory and Modern Cryptography PDF Online
9 years ago
0:08
Read Operational Semantics and Verification of Security Protocols (Information Security and
9 years ago
0:05
Download Binary Quadratic Forms: An Algorithmic Approach (Algorithms and Computation in Mathematics)
9 years ago
0:08
Read Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information
9 years ago