Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 3 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
41.
Image from Google Jackets
Cryptographic boolean functions and applications
by
Cusick, Thomas W
Stanica, Pantelimon
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Elsevier,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CUS
.
Place hold
Save to lists
42.
Image from Google Jackets
Cryptographic engineering
by
Koc, Cetin Kaya
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KOC
.
Place hold
Save to lists
43.
Image from Google Jackets
Burdens of proof : cryptographic culture and evidence law in the age of electronic documents
by
Blanchette, Jean-Franc�ois
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
MIT Press,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
347.064 BLA
.
Place hold
Save to lists
44.
Image from Google Jackets
Timing channels in cryptography : a micro-architectural perspective
by
Rebeiro, Chester
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cham:
Springer,
2015
Availability:
Items available for loan:
DAU
(1)
Call number:
005.7 REB
.
Place hold
Save to lists
45.
Image from Google Jackets
Hash function BLAKE
by
Aumasson, Jean-Philippe
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 AUM
.
Place hold
Save to lists
46.
Image from Google Jackets
Quantum cryptography using coherent states : randomized encryption and key generation
by
Corndorf, Eric
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
U.S.A.:
ProQuest,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 COR
.
Place hold
Save to lists
47.
Image from Google Jackets
Implementing SSH : strategies for optimizing the secure shell
by
Dwivedi, Himanshu
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Wiley,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DWI
.
Place hold
Save to lists
48.
Image from Google Jackets
SSH, the secure shell : the definitive guide
by
Barrett, Daniel J
Byrnes, Robert G
Silverman, Richard E
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
Shroff Publishers,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAR
.
Place hold
Save to lists
49.
Image from Google Jackets
Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by
Ioannidis, John
Keromytis, Angelos D
Yung, Moti
Series:
; 3531
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
004 IOA
.
Place hold
Save to lists
50.
Image from Google Jackets
Hashing in computer science : fifty years of slicing and dicing
by
Konheim, Alan G
Edition:
1st ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
John Wiley & Sons,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KON
.
Place hold
Save to lists
51.
Image from Google Jackets
Cryptographics : exploiting graphics cards for security
by
Keromytis, Angelos D
Cook, Debra L
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 COO
.
Place hold
Save to lists
52.
Image from Google Jackets
Coding theorems of classical and quantum information theory
by
Parthasarathy, K. R
Series:
Texts and readings in mathematics
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Hindustan Book Agency,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
003.54 PAR
.
Place hold
Save to lists
53.
Image from Google Jackets
Internet security : cryptographic principles, algorithms, and protocols
by
Rhee, Man Young
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chichester:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 RHE
.
Place hold
Save to lists
54.
Image from Google Jackets
Coding theorems of classical and quantum information theory
by
Parthasarathy, K. R
Series:
Texts and readings in mathematics, 45
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Hindustan Book Agency,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
530.12 PAR
.
Place hold
Save to lists
55.
Image from Google Jackets
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by
Izmailov, Igor
Poizner, Boris
Romanov, Ilia
Smolskiy, Sergey
Series:
Signals and Communication Technology
; 1860-4862
Publication details:
Switzerland
Springer
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 IZM
.
Lists:
Quantum Science and Technology
.
Place hold
Save to lists
56.
Image from Google Jackets
Hardware security : design, threats, and safeguards
by
Mukhopadhyay, Debdeep
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2015
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MUK
.
Place hold
Save to lists
57.
Image from Google Jackets
Introduction to cryptography with mathematical foundations and computer implementations
by
Stanoyevitch, Alexander
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 STA
.
Place hold
Save to lists
58.
Image from Google Jackets
Cryptography and network security : principles and practices
by
Stallings, William
Edition:
4th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 STA
.
Place hold
Save to lists
59.
Image from Google Jackets
Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings
by
Jonker, Willem
Petkovic, Milan
Series:
; 3178
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
004 JON
.
Place hold
Save to lists
60.
Image from Google Jackets
Encryption for digital content
by
Kiayias, Aggelos
Kiayias, Aggelos
Pehlivanoglu, Serdar
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KIA
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion