Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 4 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
61.
Image from Google Jackets
Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings
by
Snekkenes, Einar
Gollmann, Dieter
Series:
; 2808
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 SNE
.
Place hold
Save to lists
62.
Image from Google Jackets
Security, privacy and trust in modern data management
by
Petkovic, Milan
Jonker, Willem
Series:
Data-centric systems and applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PET
.
Place hold
Save to lists
63.
Image from Google Jackets
Quantum private communication
by
Zeng, Guihua
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ZEN
.
Place hold
Save to lists
64.
Image from Google Jackets
Handbook of formal analysis and verification in cryptography
by
Akleylek, Sedat
[ed.]
Dundua, Besik
[ed.]
Series:
Prospects in Pure and Applied Mathematics Series
Publication details:
Boca Raton :
CRC Press,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
005.824 AKL
.
Place hold
Save to lists
65.
Image from Google Jackets
Cryptography and information security
by
Pachghare, V. K
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
PHI Learning,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 PAC
.
Place hold
Save to lists
66.
Image from Google Jackets
Cryptography and network security : principles and practice
by
Stallings, William
Edition:
3rd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Delhi:
Pearson Education,
2003
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 STA, ..
.
Place hold
Save to lists
67.
Image from Google Jackets
Cryptography and network security : principles and practice
by
Stallings, William
Edition:
6th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Noida:
Pearson Education,
2014
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 STA, ..
.
Place hold
Save to lists
68.
Image from Google Jackets
Topics in cryptology - CT-RSA 2016 : the Cryptographers' Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
by
Sako, Kazue
Series:
Lecture notes in computer science
; 9610
Publication details:
Berlin
Springer
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 SAK
.
Place hold
Save to lists
69.
Image from Google Jackets
Fundamentals of IP and SoC security : design, verification, and debug
by
Bhunia, Swarup
Ray, Sandip
Sur-Kolay, Susmita
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Switzerland:
Springer,
2017
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BHU
.
Place hold
Save to lists
70.
Image from Google Jackets
Information hiding and applications
by
Pan, Jeng-Shyang
Huang, Hsiang-Cheh
Jain, Lakhmi C
Series:
Studies in computational intelligence
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 PAN
.
Place hold
Save to lists
71.
Image from Google Jackets
Introduction to identity-based encryption
by
Martin, Luther
Series:
Artech House information security and priacy series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 MAR
.
Place hold
Save to lists
72.
Image from Google Jackets
Identity based encryption
by
Chatterjee, Sanjit
Sarkar, Palash
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 CHA
.
Place hold
Save to lists
73.
Image from Google Jackets
Next generation SSH2 implementation : securing data in motion
by
Liu, Dale
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Burlington:
Syngress Publishing,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 LIU
.
Place hold
Save to lists
74.
Image from Google Jackets
Cryptography and network security : principles and practice
by
Stallings, William
Edition:
5th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 STA
.
Place hold
Save to lists
75.
Image from Google Jackets
Learn blockchain by building one : a concise path to understanding cryptocurrencies
by
Van Flymen, Daniel
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York :
Apress,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
005.74 VAN
.
Place hold
Save to lists
76.
Image from Google Jackets
Attribute-based credentials for trust : identity in the information society
by
Rannenberg, Kai
Camenisch, Jan
Sabouri, Ahmad
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cham:
Springer,
2015
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8223 RAN
.
Place hold
Save to lists
77.
Image from Google Jackets
Labyrinth key
by
Hendrix, Howard V
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Ballantine Books,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
813.54 HEN
.
Place hold
Save to lists
78.
Image from Google Jackets
Defending your digital assets: againts hackers, crackers, spies and theieves
by
Nichols, Randall K
Ryan, Daniel J
Ryan, Julie C. H
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
McGraw-Hill,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 NIC
.
Place hold
Save to lists
79.
Image from Google Jackets
Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001: Proceedings
by
Kim, Kwangjo
Series:
; 1992
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
004 KIM
.
Place hold
Save to lists
80.
Image from Google Jackets
Quantum communications and cryptography
by
Sergienko, Alexander V
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SER
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion