Narrow your search

Library

KU Leuven (3)

UAntwerpen (3)

UGent (2)

ULiège (2)

AP (1)

KBR (1)

KDG (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

More...

Resource type

book (5)

dissertation (4)

digital (3)


Language

English (7)

German (4)

Latin (1)


Year
From To Submit

2022 (1)

2015 (3)

2014 (1)

2008 (1)

2003 (1)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Dissertation
De aqua in Nosocomium Landishutanum affluente
Author:
Year: 1825 Publisher: Landishuti Bavarorum : Storno,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Christliche Existenz und sozialer Wandel in der ersten Hälfte des 20. Jahrhunderts : eine Hamburger Kirchengemeinde in den politischen Auseinandersetzungen der Weimarer Republik und des Dritten Reiches
Author:
Year: 1992 Publisher: [S.l.] [s.n.]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Christliche Existenz und Sozialer Wandel in der ersten Hälfte des 20. Jahrhunderts. Eine Hamburger Kirchengemeinde in den Politischen Auseinandersetzungen der Weimarer Republik und des dritten Reiches
Author:
Year: 1992 Publisher: Hamburg : Universität Hamburg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Authors: ---
ISBN: 3319268228 3319268236 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Data encryption (Computer science)


Book
Substance abuse and the family
Author:
ISBN: 9781138795068 1138795070 9781138795075 1138795062 Year: 2015 Publisher: New York, NY: Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Addicts --- Substance abuse


Book
Therapeutic Interviewing
Author:
ISBN: 1003195830 1000538575 1003195830 1032050675 Year: 2022 Publisher: Routledge

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Authors: ---
ISBN: 9783319268231 9783319268224 9783319268248 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.


Digital
Sharing demographic risk - who is afraid of the baby bust?
Authors: ---
Year: 2008 Publisher: Munich CESifo

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Public goods, club goods and the measurement of crowding
Authors: ---
Year: 1998 Publisher: Munich

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Business cycles, unemployment insurance, and the calibration of matching models
Authors: ---
Year: 2003 Publisher: Munich CESifo

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 12 << page
of 2
>>
Sort by