Games
Apps
Books
Kids
google_logo Play
  • Sign in with Google
  • play_appsLibrary & devices
  • paymentPayments & subscriptions
  • reviewsMy Play activity
  • redeemOffers
  • Play Pass
  • Personalization in Play
  • settingsSettings
  • Privacy Policy • Terms of Service
Games
Apps
Books
Kids
More by Colin Boyd
Icon image Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson
Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson
€70.84€49.59
Icon image Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings
€54.49€38.14
Icon image Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
€54.49€38.14
Icon image Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
€54.49€38.14
Icon image The Bath Monster
The Bath Monster
€5.68
Icon image Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
€54.49€38.14
Icon image Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
€98.09€68.66
Icon image Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
€54.49€38.14
Icon image Protocols for Authentication and Key Establishment: Edition 2
Protocols for Authentication and Key Establishment: Edition 2
€108.99€76.29
Google Play

Play Pass

Play Points

Gift cards

Redeem

Refund policy

Kids & family

Parent Guide

Family sharing

Terms of Service

Privacy

About Google Play

Developers

Google Store

All prices include VAT.