Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 2 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
21.
Image from Google Jackets
Design of rijndael : AES -- the advanced encryption standard
by
Rijmen, Vincent
Daemen, Joan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DAE
.
Place hold
Save to lists
22.
Image from Google Jackets
Understanding cryptography : a textbook for students and practitioners
by
Paar, Christof
Pelzl, Jan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 PAA
.
Place hold
Save to lists
23.
Image from Google Jackets
Quantum key distribution : an introduction with exercises
by
Wolf, Ramona
Series:
Lecture notes in physics
; v988
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cham :
Springer,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
530.12 WOL
.
Place hold
Save to lists
24.
Image from Google Jackets
Security and privacy for implantable medical devices
by
Burleson, Wayne
Carrara, Sandro
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
617.956 BUR
.
Place hold
Save to lists
25.
Image from Google Jackets
Multimedia data hiding
by
Wu, Min
Liu, Bede
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
006.7 WUM
.
Place hold
Save to lists
26.
Image from Google Jackets
Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers
by
Morsch, Oliver
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Weinheim:
Wiley-VCH,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 MOR
.
Lists:
Quantum Science and Technology
.
Place hold
Save to lists
27.
Image from Google Jackets
Multimedia fingerprinting forensics for traitor tracing
by
Liu, K. J. Ray
Series:
EURASIP book series on signal processing and communications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Hindawi Publishing Corporation,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 LIU
.
Place hold
Save to lists
28.
Image from Google Jackets
Quantum communication networks
by
Bassoli, Riccardo [et. all.]
Series:
Foundations in signal processing, communications and networking
; v23
Publication details:
Cham :
Springer,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
621.3827 BAS
.
Lists:
Quantum Science and Technology
.
Place hold
Save to lists
29.
Image from Google Jackets
Foundations of security : what every programmer needs to know
by
Daswani, Neil
Kern, Christoph
Kesavan, Anita
Series:
The Expert's oice in security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berkeley:
Apress,
2007
Availability:
Items available for loan:
DAU
(5)
Call number:
005.8 DAS, ..
.
Place hold
Save to lists
30.
Image from Google Jackets
Security of block ciphers : from algorithm design to hardware implementation
by
Sakiyama, Kazuo
Sasaki, Yu
Li, Yang
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
S.l. :
Wiley & Sons
2015
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 SAK
.
Place hold
Save to lists
31.
Image from Google Jackets
Circuits and systems for security and privacy
by
Sheikh, Farhana
Sousa, Leonel A
Iniewski, Krzysztof
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton :
CRC Press,
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SHE
.
Place hold
Save to lists
32.
Image from Google Jackets
Secure data deletion
by
Reardon, Joel
Series:
Information security and cryptography
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Switzerland:
Springer,
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.74 REA
.
Place hold
Save to lists
33.
Image from Google Jackets
Electronic payment systems for E-commerce
by
O'Mahony, Donal
Series:
Artech House computer security series
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OMA
.
Place hold
Save to lists
34.
Image from Google Jackets
Code book : the secret history of codes and codebreaking
by
Singh, Simon
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London:
Fourth Estate,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
652.8 SIN
.
Place hold
Save to lists
35.
Image from Google Jackets
Guide to pairing-based cryptography
by
El Mrabet, Nadia
[ed.]
Series:
Chapman & Hall CRC cryptography and network security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton :
CRC Press,
2017
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 EIM
.
Place hold
Save to lists
36.
Image from Google Jackets
Listening in : cybersecurity in an insecure age
by
Landau, Susan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London :
Yale University Press,
2017
Availability:
Items available for loan:
DAU
(1)
Call number:
364.168 LAN
.
Place hold
Save to lists
37.
Image from Google Jackets
Cryptology : classical and modern with maplets
by
Klima, Richard E
Sigmon, Neil
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KLI
.
Place hold
Save to lists
38.
Image from Google Jackets
Applied information security : a hands-on approach
by
Basin, David
Schaller, Patrick
Schl�pfer, Michael
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAS
.
Place hold
Save to lists
39.
Image from Google Jackets
Writing secure code
by
Howard, Michael
LeBlanc, David
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Washington:
Microsoft Press,
2002
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 HOW, ..
.
Place hold
Save to lists
40.
Image from Google Jackets
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by
Kayem, Anne V. D. M
Akl, Selim G
Martin, Patrick
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KAY
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion