Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Data Encryption"', page 5 of 7
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Akleylek, Sedat
Akl, Selim G.
Boyd, Colin
Christianson, Bruce
Gollmann, Dieter
Jonker, Willem
Keromytis, Angelos D.
Koc, Cetin Kaya
Landau, Susan
Naccache, David
Paar, Christof
Parthasarathy, K. R.
Pelzl, Jan
Petkovic, Milan
Stallings, William
Yung, Moti
Zhou, Jianying
Show more
Show less
Item types
Books
CD-DVDs
Series
Adances in information security
Advances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall CRC cryptography and network security
Chapman & Hall/CRC cryptography and network security
Computer architecture and design methodologies
Data-centric systems and applications
Discrete mathematics and its applications
EAI/Springer Innovations in Communication and Computing
EURASIP book series on signal processing and communications
Foundations in signal processing, communications and networking
IEEE Press series on information & communication networks security
IFIP adances in information and communication technology
Information security and cryptography
Insights you need from Harvard Business Review
Lecture notes in computer science
Lecture notes in computer science ; 1560
Lecture notes in physics
Proceedings of SPIE--the International Society for Optical Engineering
Show more
Show less
Topics
Algorithm Analysis and Problem Complexity
Algorithms
Ciphers
Coding theory
Computer communication networks
Computer networks
Computer networks -- Security measures
Computers - Access control
Computer science
Computer security
Cryptography
Database security
Data encryption
Data Encryption
Data encryption (Computer science)
Data protection
Information systems
Management of Computing and Information Systems
Operating systems
Public key cryptography
Show more
Show less
Your search returned 133 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
81.
Image from Google Jackets
Blockchain : the insights you need from harvard business review
by
Harvard Business Review
Series:
Insights you need from Harvard Business Review
Publication details:
Boston :
Harvard Business Review Press,
2019
Availability:
Items available for loan:
DAU
(1)
Call number:
658.0557 HAR
.
Place hold
Save to lists
82.
Image from Google Jackets
Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 ; proceedings
by
Jakobsson, Markus
Yung, Moti
Zhou, Jianying
Series:
; 3089
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
004 JAK
.
Place hold
Save to lists
83.
Image from Google Jackets
Cryptography arithmetic : algorithms and hardware architectures
by
Omondi, Amos R
Series:
Advances in information security
; 77
Publication details:
Cham :
Springer,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
005.824 OMO
.
Place hold
Save to lists
84.
Image from Google Jackets
Preserving privacy in data outsourcing
by
Foresti, Sara
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 FOR
.
Place hold
Save to lists
85.
Image from Google Jackets
Cryptanalytic attacks on RSA
by
Yan, Song Y
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 YAN
.
Place hold
Save to lists
86.
Image from Google Jackets
Symmetric cryptographic protocols
by
Ramkumar, Mahalingam
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Switzerland:
Springer,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 RAM
.
Place hold
Save to lists
87.
Image from Google Jackets
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by
Imai, Hideki
Zheng, Yuliang
Series:
Lecture notes in computer science ; 1560
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
1999
Availability:
Items available for loan:
DAU
(1)
Call number:
004 IMA
.
Place hold
Save to lists
88.
Image from Google Jackets
Implementing SSL/​TLS using cryptography and PKI
by
Davies, Joshua
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis :
Wiley,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DAV
.
Place hold
Save to lists
89.
Image from Google Jackets
Multimedia content encryption : techniques and applications
by
Lian, Shiguo
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
Auerbach Publications,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 LIA
.
Place hold
Save to lists
90.
Image from Google Jackets
Modern cryptology : a tutorial
by
Brassard, Gilles
Series:
; 325
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
1988
Availability:
Items available for loan:
DAU
(1)
Call number:
004 BRA
.
Lists:
Quantum Science and Technology
.
Place hold
Save to lists
91.
Image from Google Jackets
Computational number theory
by
Das, Abhijit
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
512.70285 DAS
.
Place hold
Save to lists
92.
Image from Google Jackets
Rethinking public key infrastructures and digital certificates: Building in privacy
by
Brands, Stefan A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
The MIT Press,
2000
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 BRA, ..
.
Place hold
Save to lists
93.
Image from Google Jackets
Cryptonomicon
by
Stephenson, Neal
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Avon Books,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
813.54 STE
.
Place hold
Save to lists
94.
Image from Google Jackets
Design and analysis of cryptographic algorithms in blockchain
by
Huang, Ke
Mu, Yi
Rezaeibagha, Fatemeh
Zhang, Xiaosong
Publication details:
Boca Raton :
CRC Press,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
005.824 HUA
.
Place hold
Save to lists
95.
Image from Google Jackets
Trust Management IV
by
Nishigaki, Masakatsu
Series:
IFIP adances in information and communication technology
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005 NIS
.
Place hold
Save to lists
96.
Image from Google Jackets
Formal correctness of security protocols
by
Bella, Giampaolo
Series:
Information security and cryptography
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 BEL
.
Place hold
Save to lists
97.
Image from Google Jackets
Advances in information processing and protection
by
Pejas, Jerzy
Saeed, Khalid
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
006.33 PEJ
.
Place hold
Save to lists
98.
Image from Google Jackets
IM, instant messaging security
by
Rittinghouse, John W
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Elsevier,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
004.692 RIT
.
Place hold
Save to lists
99.
Image from Google Jackets
Mathematics of encryption : an elementary introduction
by
Cozzens, Margaret
Miller, Steven J
Series:
Mathematical world
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Providence:
American Mathematcial Society,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
652.80151 COZ
.
Place hold
Save to lists
100.
Image from Google Jackets
Secure messaging with PGP and S/MIME
by
Oppliger, Rolf
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OPP
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion