0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (90)
  • R500+ (1,932)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012,... Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yun Q. Shi, Fernando Perez-Gonzalez, Hyoung Joong Kim
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised... Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Ahmad-Reza Sadeghi
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings (Paperback,... Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings (Paperback, 2013 ed.)
Rafael Accorsi, Silvio Ranise
R1,968 Discovery Miles 19 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011,... Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers (Paperback, 2014)
Dave Bacon, Miguel Martin-Delgado, Martin Roetteler
R2,134 Discovery Miles 21 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011. The 14 revised papers presented were carefully selected from numerous submissions. The papers present new and original research and cover a large range of topics in quantum computation, communication and cryptography, a new and interdisciplinary field at the intersection of computer science, information theory and quantum mechanics.

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July... Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings (Paperback, 2013 ed.)
Lingyu Wang, Basit Shafiq
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.

Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013,... Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Emmanuel Prouff
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback,... E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback, 2013 ed.)
James Heather, Steve Schneider, Vanessa Teague
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain... Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).

Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14,... Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Sabrina de Capitani di Vimercati, Chris Mitchell
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013.... Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (Paperback, 2013 ed.)
Ran Canetti, Juan A. Garay
R3,183 Discovery Miles 31 830 Ships in 10 - 15 working days

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.

Codes, Systems, and Graphical Models (Paperback, 2001 ed.): Brian Marcus, Joachim Rosenthal Codes, Systems, and Graphical Models (Paperback, 2001 ed.)
Brian Marcus, Joachim Rosenthal
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

Coding theory, system theory, and symbolic dynamics have much in common. A major new theme in this area of research is that of codes and systems based on graphical models. This volume contains survey and research articles from leading researchers at the interface of these subjects.

Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings... Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings (Paperback, 2013 ed.)
Emiliano De Cristofaro, Matthew Wright
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback,... Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback, 2013 ed.)
Philippe Gaborit
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.

Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24,... Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings (Paperback, 2013 ed.)
Amr Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.

Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Paperback, 2013 ed.)
Thomas Johansson, Phong Q. Nguyen
R1,676 Discovery Miles 16 760 Ships in 10 - 15 working days

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.

Advanced Infocomm Technology - 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected... Advanced Infocomm Technology - 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Paperback, 2013 ed.)
Vincent Guyot
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Advanced Infocomm Technology, ICAIT 2012, held in Paris, France, July 2012.
The 32 revised full papers presented together with 4 invited talks were carefully selected from 97 submissions. The papers are organized in topical sections on fixed mobile convergence and emerging networks technologies, performance and quality of service, fiber technologies and multimedia processing, communication softwares and services, security, sensor technologies and wireless systems, energy-aware networks and power management, and mobile ad-hoc, mesh and vehicular networks.

Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International... Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France (Paperback, Softcover reprint of the original 1st ed. 2004)
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure,... Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013, Proceedings (Paperback, 2013 ed.)
Guillaume, Doyen,, Martin Waldburger, Pavel Celeda, Anna Sperotto, Burkhard Stiller
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, held in Barcelona, Spain, in June 2013. The 11 full papers presented were carefully reviewed and selected from 32 submissions. The volume also includes 7 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 14 submissions. The papers are organized in topical sections on traffic engineering and quality-of-service; monitoring and modeling; security management; content distribution and multimedia; autonomous management; and monitoring mechanisms.

Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013,... Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings (Paperback, 2013 ed.)
Robert H. Deng, Tao Feng
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Trusted Information - The New Decade Challenge (Paperback, Softcover reprint of the original 1st ed. 2001): Michel Dupuy,... Trusted Information - The New Decade Challenge (Paperback, Softcover reprint of the original 1st ed. 2001)
Michel Dupuy, Pierre Paradinas
R5,765 Discovery Miles 57 650 Ships in 10 - 15 working days

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec'86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.): Xiali Hei, Xiaojiang Du Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.)
Xiali Hei, Xiaojiang Du
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The... Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jaap-Henk Hoepman, Ingrid Verbauwhede
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

OFDM - Concepts for Future Communication Systems (Paperback, 2011 ed.): Hermann Rohling OFDM - Concepts for Future Communication Systems (Paperback, 2011 ed.)
Hermann Rohling
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several advantages in broadcast and mobile communications applications. The main objective of this book is to give a good insight into these efforts, and provide the reader with a comprehensive overview of the scientific progress which was achieved in the last decade. Besides topics of the physical layer, such as coding, modulation and non-linearities, a special emphasis is put on system aspects and concepts, in particular regarding cellular networks and using multiple antenna techniques. The work extensively addresses challenges of link adaptation, adaptive resource allocation and interference mitigation in such systems. Moreover, the domain of cross-layer design, i.e. the combination of physical layer aspects and issues of higher layers, are considered in detail. These results will facilitate and stimulate further innovation and development in the design of modern communication systems, based on the powerful OFDM transmission technique.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
The Economics of Blockchain and…
James L. Caton Hardcover R2,965 Discovery Miles 29 650
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310
Introduction to Bitcoin
David Ricardo Hardcover R765 Discovery Miles 7 650
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,332 Discovery Miles 33 320
New Research on the Voynich Manuscript…
National Security Agency Hardcover R526 Discovery Miles 5 260
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R969 Discovery Miles 9 690
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R2,020 R1,631 Discovery Miles 16 310
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,596 Discovery Miles 25 960
Coding Strategies in Vertebrate Acoustic…
Thierry Aubin, Nicolas Mathevon Hardcover R5,155 Discovery Miles 51 550

 

Partners