Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 6 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
101.
Image from Google Jackets
Digital Rights Management : Technological, Economic, Legal and Political Aspects
by
Becker, Eberhard
Buhse, Willms
Gunnewig, Dirk
Rump, Niels
Series:
; 2770
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 BEC
.
Lists:
Copyrights, Patents & IPR
.
Place hold
Save to lists
102.
Image from Google Jackets
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by
Delp, Edward J
Dittmann, Jana
Memon, Nasir D
Wong, Ping Wah
Series:
Proceedings of SPIE--the International Society for Optical Engineering
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Bellingham:
SPIE,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DEL
.
Place hold
Save to lists
103.
Image from Google Jackets
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings
by
Vigna, Giovanni
Jonsson, Erland
Kruegel, Christopher
Series:
; 2820
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 VIG
.
Place hold
Save to lists
104.
Image from Google Jackets
Mathematics of data/image coding, compression, and encryption VI, with applications : 5 and 7 August 2003, San Diego, California, USA
by
Schmalz, Mark S
Series:
Proceedings of SPIE--the International Society for Optical Engineering
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Washington:
SPIE,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.746 SCH
.
Place hold
Save to lists
105.
Image from Google Jackets
Emerging challenges for security, privacy and trust
by
Gritzalis, Dimitris
Lopez, Javier
Series:
IFIP adances in information and communication technology
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GRI
.
Place hold
Save to lists
106.
Image from Google Jackets
Non-Repudiation in electronic commerce
by
Zhou, Jianying
Series:
Artech House computer security series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ZHO
.
Place hold
Save to lists
107.
Image from Google Jackets
Handbook of financial cryptography and security
by
Rosenberg, Burton
Series:
Chapman & Hall/CRC cryptography and network security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
332.178 ROS
.
Place hold
Save to lists
108.
Image from Google Jackets
Foundations of Security Analysis and Design II : FOSAD 2001/2002 Turorial Lectures
by
Focardi, Riccardo
Gorrieri, Robert
Series:
; 2946
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
004 FOC
.
Place hold
Save to lists
109.
Image from Google Jackets
Hardware oriented authenticated encryption based on tweakable block ciphers
by
Khairallah, Mustafa
Series:
Computer architecture and design methodologies
Publication details:
Singapore :
Springer,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KHA
.
Place hold
Save to lists
110.
Image from Google Jackets
Homomorphic encryption for data science (HE4DS)
by
Adir, Allon
Aharoni, Ehud
Drucker, Nir
Levy, Ronen
Shaul, Hayim
Soceanu, Omri
Publication details:
Cham :
springer,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ADI
.
Place hold
Save to lists
111.
Image from Google Jackets
Protocols for authentication and key establishment
by
Boyd, Colin
Mathuria, Anish
Series:
Information security and cryptography
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(2)
Call number:
005.82 BOY, ..
.
Place hold
Save to lists
112.
Image from Google Jackets
Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings
by
Naccache, David
Paillier,Pascal
Series:
; 2274
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
004 NAC
.
Place hold
Save to lists
113.
Image from Google Jackets
Homomorphic encryption and applications
by
Yi, Xun
Paulet, Russell
Bertino, Elisa
Series:
Springer Briefs in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York :
Springer International Publishing,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8​2 YIX
.
Place hold
Save to lists
114.
Image from Google Jackets
Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop Paris, France, May 14-16, 2001 Proceedings
by
Koc, Cetin Kaya
Naccache, David
Paar, Christof
Series:
; 2162
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
004 KOC
.
Place hold
Save to lists
115.
Image from Google Jackets
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by
Gorodetsky, Vladimir
Popyack, Leonard
Skormin, Victor
Series:
; 2776
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 GOR
.
Place hold
Save to lists
116.
Image from Google Jackets
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
by
Nita, Stefania Loredana
Mihailescu, Marius Iulian
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York :
Apress,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 NIT
.
Place hold
Save to lists
117.
Image from Google Jackets
Quantum cryptography : from key distribution to conference key agreement
by
Grasselli, Federico
Series:
Quantum science and technology
; 2364-9054
Publication details:
Cham :
Springer,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
005.824 GRA
.
Place hold
Save to lists
118.
Image from Google Jackets
Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers
by
Johansson, Thomas
Series:
; 2887
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 JOH
.
Place hold
Save to lists
119.
Image from Google Jackets
Composition of Secure Multi-Party Protocols : Comprehensive Study
by
Lindell, Yehuda
Series:
; 2815
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 LIN
.
Place hold
Save to lists
120.
Image from Google Jackets
Privacy on the line : the politics of wiretapping and encryption
by
Diffie, Whitfield
Landau, Susan
Edition:
Updated & expanded ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
MIT Press,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
342.730858 DIF
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion