Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 7 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
121.
Image from Google Jackets
Surveillance or security? : the risks posed by new wiretapping technologies
by
Landau, Susan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
MIT Press,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
363.252 LAN
.
Place hold
Save to lists
122.
Image from Google Jackets
Random numbers and computers
by
Kneusel, Ronald T
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cham :
Springer International Publishing,
2018
Availability:
Items available for loan:
DAU
(1)
Call number:
518 KNE
.
Place hold
Save to lists
123.
Image from Google Jackets
Introduction to cyberdeception
by
Rowe, Neil C
Rrushi, Julian
Publication details:
Cham :
Springer,
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ROW
.
Place hold
Save to lists
124.
Image from Google Jackets
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by
Jarvis, Craig
Publication details:
Boca Raton :
CRC Press,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
323.448 JAR
.
Place hold
Save to lists
125.
Image from Google Jackets
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by
Lioy, Antonio
Mazzocchi, Daniele
Series:
; 2828
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 LIO
.
Place hold
Save to lists
126.
Image from Google Jackets
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by
Koc, Cetin Kaya
Paar, Christof
Series:
; 1965
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
004 KOC
.
Place hold
Save to lists
127.
Image from Google Jackets
Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings
by
Qing, Sihan
Gollmann, Dieter
Zhou, Jianying
Series:
; 2836
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 QIN
.
Place hold
Save to lists
128.
Image from Google Jackets
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by
Christianson, Bruce
Series:
; 2133
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
004 CHR
.
Place hold
Save to lists
129.
Image from Google Jackets
Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers
by
Christianson, Bruce
Series:
; 2845
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
004 CHR
.
Place hold
Save to lists
130.
Image from Google Jackets
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by
Boyd, Colin
Mao, Wenbo
Series:
; 2851
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 BOY
.
Place hold
Save to lists
131.
Image from Google Jackets
Understanding bitcoin : cryptography, engineering and economics
by
Franco, Pedro
Series:
Wiley Finance Series
Publication details:
Chichester :
Wiley,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
658.84 FRA
.
Place hold
Save to lists
132.
Image from Google Jackets
Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop Cologne, Germany, September 8-10, 2003: Proceedings
by
Wlater, Colin D
Koc, Cetin Kaya
Paar, Christof
Series:
; 2779
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 WLA
.
Place hold
Save to lists
133.
Image from Google Jackets
Functional encryption
by
Ahmad, Khairol Amali Bin
Ahmad, Khaleel
Dulhare, Uma N
Series:
EAI/Springer Innovations in Communication and Computing
; 2522-8595
Publication details:
Cham :
Springer,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
621.382 AHM
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Not finding what you're looking for?
Make a
purchase suggestion