Examples: Prince; Princeton University; Ken Follett; Follett,Ken
1shortlisttitle datasearch history  
results search [or] (ISNI Number (ISN:)) 0000000108560158 | 1 hits
Person
ISNI: 
0000 0001 0856 0158
Name: 
Schneier, B.
Schneier, Bruce
Šnajer, Brus
Шнайер, Б
シュナイアー, ブルース
Dates: 
1963-
Creation class: 
article
cre
Language material
Text
Creation role: 
author
contributor
editor
Related names: 
Ferguson, Niels
Kohno, Tadayoshi
Quisquater, Jean-Jacques (1945-...)
Rykaczewski, Roman
Sobczak, Ryszard
Szpryngier, Piotr
Viennot, Laurent
Wydawnictwa Naukowo-Techniczne
Yamagata, Hiroo (1964-)
Żmijewski, Tomasz
山形, 浩生 (1964-)
Titles: 
Angō gijutsu taizen
Angō no himitsu to uso : Nettowāku shakai no dejitaru sekyuriti
Applied cryptography : protocols, algorithms, and source code in C
Beyond fear : thinking sensibly about security in an uncertain world
CARDIS'98, smart card research and applications
Carry on : sound advice from Schneier on security
Crypto-gram newsletter
Cryptographie appliquée protocoles, algorithmes et codes source en C
Cryptographie appliquée protocoles, algorithmes et codes sources en C
Cryptography engineering : design principles and practical applicationns
Cryptography engineering : design principles and practical applications
Digital security in a networked world
E-mail security how to keep your electronic messages private
E-mail security with PGP & PEM
E-Mailセキュリティ
Economics of information security and privacy III
electronic privacy papers, The : documents on the battle for privacy in the age of surveillance
Enabling the trust that society needs to thrive
Fast software encryption 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000 : proceedings
Īmēru sekyuriti
Kryptografia dla praktyków : protokoły, algorytmy i programy źródłowe w języku C
Kryptografia w praktyce
Liars and outliers : enabling the trust that society needs to thrive
Ochrona poczty elektronicznej : jak chronić prywatność korespondencji w sieci Internet ?
Practical cryptography
Primenjena kriptografija, prevod drugog izdanja : protokoli, algoritmi i izvorni kôd na jeziku C
Protocols, algorithms, and source code in C
Protokoły, algorytmy i programy źródłowe w języku C
Schneier on security
Secrets and lies : digital security in a networked world
Secrets et mensonges sécurité numérique dans un monde de réseau
Sekyuriti wa naze yaburaretanoka
Shinrai to uragiri no shakai.
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998 : proceedings
twofish encryption algorithm, The : a 128-bit block cipher
Прикладная криптография : протоколы, алгоритмы, исходные тексты на языке Си
セキュリティはなぜやぶられたのか
信頼と裏切りの社会
暗号の秘密とウソ : ネットワーク社会のデジタルセキュリティ
暗号技術大全
Contributed to or performed: 
INTERNATIONAL HYDROGRAPHIC REVIEW
Notes: 
Sources: 
VIAF BNC BNF LC LNB NDL NKC NLP NSK NTA NUKAT SUDOC WKP
TEL
ZETO