alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 4 Results, Digital:4, Print: 0

Showing Page No. 1 , Digital:4, Print: 0

A linear construction of perfect secret sharing schemes

By Dijk, M. van
101., ()

Subject: Advances in Cryptology - EuroCrypt '94; Lecture Notes in Computer Science Volume 950; secret sharing; perfect secret sharing
Availability: 1 of 1(eBook)
Read More

Integrated 60GHz RF Beamforming in CMOS (Analog Circuits and Signal Processing, 1)

By Yikun Yu, Peter G.M. Baltus, Arthur H.M. van Roermund
101., ()

Subject: Springer 2011; 9400706618 9789400706613
Availability: 1 of 1(eBook)
Read More

Measuring the Value of Information Technology

By Han Van Der Zee, Han T. M. Van Der Zee
2011., ()

Subject:
Availability: 1 of 1(eBook)
Read More

Risk Management in Financial Institutions: Formulating Value Propositions

By J.H.M. Van Grinsven
2010., ()

Subject: 1607500876; 9781607500872
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All