alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 7 Results, Digital:7, Print: 0

Showing Page No. 1 , Digital:7, Print: 0

An l-span generalized secret sharing scheme

By Harn, L.
101., ()

Subject: Advances in Cryptology - Crypto '92; Lecture Notes in Computer Science Volume 740; secret sharing
Availability: 1 of 1(eBook)
Read More

Comments on Soviet encryption algorithm

By Charnes, C., O'Connor, L., Pieprzyk, J., Safavi-Naini, R.
101., ()

Subject: Advances in Cryptology - EuroCrypt '94; Lecture Notes in Computer Science Volume 950; GOST
Availability: 1 of 1(eBook)
Read More

E-Habits: What You Must Do to Optimize Your Professional Digital Presence

By Elizabeth Charnock
2010., ()

Subject: 0071629955 9780071629959
Availability: 1 of 1(eBook)
Read More

Fighting Suicide Bombing

By Charny, Israel W.
2011., ()

Subject:
Availability: 1 of 1(eBook)
Read More

Harnessing Full Value from the DoD Serum Repository and the Defense Medical Surveillance System

By Melinda Moore, Elisa Eiseman, Gail Fisher, Stuart S. Olmsted, Preethi R. Sama, John A. Zambrano
2010., ()

Subject: Examines the DoDSR and DMSS; identifies gaps; and suggests strategies to improve their management; content; and use to meet current and potential military health needs related to surveillance; outbrea
Availability: 1 of 1(eBook)
Read More

Harnessing Post-Conflict Transactions: A Conceptual Primer

By Nicholas J. Armstrong
2010., ()

Subject: Current research and available tools for transition in post-conflict situations is analyzed. The authors make a significant contribution to the field by providing a broadly applicable definition of tr
Availability: 1 of 1(eBook)
Read More

Innovation Networks: New Approaches in Modelling and Analyzing (Understanding Complex Systems)Understanding

By Andreas Pyka, Andrea Scharnhorst
2010., ()

Subject: ISBN-13:; 9783540922667
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All