Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Public key cryptography"', page 2 of 2
Refine your search
Availability
Limit to records with available items
Authors
Bashir, Imran
Bertino, Elisa
Burnett, Steve
Chatterjee, Sanjit
Damgard, Ivan
Das, Abhijit
Delfs, Hans
Dooley, John F
Galbreath, Nick
Garrett, Paul
Heins, Kersten
Hinek, M. Jason
Igarashi, Yoshihide
Imai, Hideki
Jarvis, Craig
Koblitz, Neal
Lieman, Daniel
Lisdorf, Anders
Madhavan, C. E. Veni
Mollin, Richard A.
Show more
Show less
Item types
Books
CD-DVDs
Series
Artech House information security and priacy series
Chapman & Hall/CRC cryptography and network security
Discrete mathematics and its applications
Expert insight
Frontiers in artificial intelligence and applications
History of computing
Kluwer international series in engineering and computer science. Communications and information theory
Lecture notes in computer science
Lecture notes in computer science ; 1560
Proceedings of symposia in applied mathematics
Springer Briefs in computer science
Synthesis lectures on engineering, science, and technology
Texts in theoretical computer science
Show more
Show less
Topics
Central Intelligence Agency (CIA)
Clinton administration
Computers -- Access control
Computer science
Computer security
Cryptography
Cypherpunks
Data encryption
Data encryption (Computer science)
Data Encryption Standard (DES)
Electrical Technology
Elliptic curve
Invention Secrets Act
National Security Agency (NSA)
Operation BULLRUN
Public key cryptography
Public-key cryptography
Public Key Cryptography
Public key infrastructure (Computer security)
Telecommunication -- Security measures -- Mathematics
Show more
Show less
Your search returned 26 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
21.
Image from Google Jackets
Still searching for Satoshi : unveiling the blockchain revolution
by
Lisdorf, Anders
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York :
Apress,
2023
Availability:
Items available for loan:
DAU
(1)
Call number:
005.74 LIS
.
Place hold
Save to lists
22.
Image from Google Jackets
Mastering blockchain : a deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more
by
Bashir, Imran
Series:
Expert insight
Edition:
3rd ed.
Publication details:
Birmingham :
Packt Publishing,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
005.74 BAS
.
Place hold
Save to lists
23.
Image from Google Jackets
Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings
by
Naccache, David
Paillier,Pascal
Series:
; 2274
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
004 NAC
.
Place hold
Save to lists
24.
Image from Google Jackets
Homomorphic encryption and applications
by
Yi, Xun
Paulet, Russell
Bertino, Elisa
Series:
Springer Briefs in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York :
Springer International Publishing,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 YIX
.
Place hold
Save to lists
25.
Image from Google Jackets
Trusted cellular IoT devices : design ingredients and concepts
by
Heins, Kersten
Series:
Synthesis lectures on engineering, science, and technology
Publication details:
Cham :
Springer,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
004.6782 HEI
.
Place hold
Save to lists
26.
Image from Google Jackets
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by
Jarvis, Craig
Publication details:
Boca Raton :
CRC Press,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
323.448 JAR
.
Place hold
Save to lists
First
Previous
1
2
Not finding what you're looking for?
Make a
purchase suggestion