Languages
Sadeghi, Ahmad-Reza.
Overview
Works: | 1 works in 6 publications in 1 languages |
---|
Titles
Trusted Computing - Challenges and Applications = First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
Congress on Progress and Controversies in Oncological Urology (2000:); Lipp, Peter.; Sadeghi, Ahmad-Reza.; Koch, Klaus-Michael.; SpringerLink (Online service)
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
SpringerLink (Online service); Pieprzyk, Josef.; Sadeghi, Ahmad-Reza.; Manulis, Mark.; Congress on Progress and Controversies in Oncological Urology (2000:)
(Electronic resources)
Research in cryptology = second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
Congress on Progress and Controversies in Oncological Urology (2000:); Sadeghi, Ahmad-Reza.; Wolf, Christopher.; SpringerLink (Online service); Lucks, Stefan.
(Electronic resources)
Trust and trustworthy computing = third international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
Congress on Progress and Controversies in Oncological Urology (2000:); Sadeghi, Ahmad-Reza.; Smith, Sean W.; SpringerLink (Online service); Acquisti, Alessandro.
(Electronic resources)
Information hiding = 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
SpringerLink (Online service); Congress on Progress and Controversies in Oncological Urology (2000:); Sadeghi, Ahmad-Reza.; Katzenbeisser, Stefan.
(Electronic resources)
Towards hardware-intrinsic security = foundations and practice /
by:
Sadeghi, Ahmad-Reza.; SpringerLink (Online service); Tuyls, Pim.; Naccache, David.
(Electronic resources)
Subjects
Software Engineering.
Systems and Data Security.
Math Applications in Computer Science.
Algorithm Analysis and Problem Complexity.
Data Encryption.
Cryptography
Symbolic and Algebraic Manipulation.
Coding and Information Theory.
Computer Communication Networks.
Data Storage Representation.
Internet- Security measures
User Interfaces and Human Computer Interaction.
Discrete Mathematics in Computer Science.
Data encryption (Computer science)
Computer Science.
Computer Hardware.
Computer Systems Organization and Communication Networks.
Information Systems Applications (incl.Internet)
Computer input-output equipment.
Management of Computing and Information Systems.
Computer security
Legal Aspects of Computing.
Electrical Engineering.
Data Structures, Cryptology and Information Theory.
Computers and Society.
Computer networks- Security measures