Home
Add Document
Sign In
Register
David Yung's Documents
Home
David Yung's Documents
David Yung's Documents
Malicious cryptography: Exposing cryptovirology
Read more
Non-Linear Elliptic Equations in Conformal Geometry
Read more
Assessment Reform in Science: Fairness and Fear (Science & Technology Education Library)
Read more
Applied Cryptography and Network Security, 5 conf., ACNS 2007
Read more
Problems and solutions on atomic, nuclear and particle physics
Read more
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Read more
Problems and Solutions on Thermodynamics and Statistical Mechanics (Major American Universities Ph.D. Qualifying Questions and Solutions)
Read more
Problems and solutions on mechanics
Read more
Intelligent Systems: Modeling, Optimization, and Control
Read more
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings
Read more
Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005,
Read more
Monetary and Financial Integration in East Asia: The Relevance of European Experience
Read more
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology)
Read more
Intelligent Systems: Modeling, Optimization, and Control (Automation and Control Engineering)
Read more
Geriatric Rheumatology: A Comprehensive Approach
Read more
Intelligent systems: modeling, optimization, and control
Read more
Smooth Compactifications of Locally Symmetric Varieties (Cambridge Mathematical Library)
Read more
Smooth compactifications of locally symmetric varieties
Read more
Agents in Principle, Agents in Practice - PRIMA 2011
Read more
Smooth Compactifications of Locally Symmetric Varieties, Second Edition (Cambridge Mathematical Library)
Read more
Cancer Neurology in Clinical Practice 2nd Edition - Neurologic Complications of Cancer and Its Treatment (Current Clinical Oncology)
Read more
Progress in Cryptology - INDOCRYPT 2007, 8 conf
Read more
Photochemistry of Planetary Atmospheres
Read more
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Read more
Multimedia Security Technologies for Digital Rights Management
Read more
Atmospheric Radiation: Theoretical Basis
Read more
Treating Schizophrenia in the Prodromal Phase
Read more
Information Security Applications, 9 conf., WISA 2008
Read more
Applied Cryptography and Network Security, 2 conf., ACNS 2004
Read more
Applied Cryptography and Network Security, 1 conf., ACNS 2003
Read more
«
1
2
3
4
5
6
7
8
9
10
»
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Login with Facebook
Our partners will collect data and use cookies for ad personalization and measurement.
Learn how we and our ad partner Google, collect and use data
.
Agree & close