Showing 1 - 6 results of 6 for search 'Krenn, Stephan', query time: 0.03s
Refine Results
-
1
An Introduction to Secret Sharing A Systematic Overview and Guide for Protocol Selection by Krenn, Stephan, Lorünser, Thomas
Cham : Springer International Publishing : Imprint: Springer, 2023
1st ed. 2023.Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
-
2
Cryptology and Network Security 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
Cham : Springer International Publishing : Imprint: Springer, 2020Other Authors: “…Krenn, Stephan…”
1st ed. 2020.
Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
-
3
Privacy and Identity Management 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers
Cham : Springer International Publishing : Imprint: Springer, 2021Other Authors:
1st ed. 2021.Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
-
4
Cryptology and Network Security 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings
Cham : Springer International Publishing : Imprint: Springer, 2021Other Authors:
1st ed. 2021.Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
-
5
Privacy and Identity Management. Between Data Protection and Security 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Eve...
Cham : Springer International Publishing : Imprint: Springer, 2022Other Authors:
1st ed. 2022.Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
-
6
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, A...
Cham : Springer International Publishing : Imprint: Springer, 2019Other Authors:Call Number: Loading…
Located: Loading…Format: Electronic eBookFull text (Wentworth users only)
Search Tools:
Related Subjects
Data encryption (Computer science)
Application software
Computer networks
Computer security
Computers
Cryptography
Data protection
Software engineering
Artificial intelligence
Cloud Computing
Coding theory
Computer Networks
Computer science
Data processing
Information theory
Optical data processing
Social sciences