Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Cryptographic imaginaries and networked publics: a cultural history of encryption technologies, 1967-2017
PDF
Light-weight multimedia encryption:  Algorithms and performance analysis
PDF
Privacy-aware geo-marketplaces
PDF
Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers
PDF
Novel and efficient schemes for security and privacy issues in smart grids
PDF
Sacrificing cost, performance and usability for privacy: understanding the value of privacy in a multi‐criteria decision problem
PDF
Use Signal, use Tor? The political economy of digital rights technology
PDF
Office of Naval Intelligence. Documents on Japanese espionage in the United States, 1930s-1940s
Cloud-enabled mobile sensing systems
PDF
Techniques for audiovisual data confidentiality, integrity and copyright protection
PDF
lou-navyint-082~017
lou-navyint-082~004
lou-navyint-082~013
lou-navyint-082~119
lou-navyint-082~109
lou-navyint-082~008
lou-navyint-082~116
lou-navyint-082~002
lou-navyint-082~032
lou-navyint-082~026
lou-navyint-082~028
lou-navyint-082~034
lou-navyint-082~127
lou-navyint-082~068
lou-navyint-082~111
of 5