|
61.
|
Public-key cryptography
by Salomma, Arto. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
|
|
62.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
63.
|
Algorithmic Number Theory
by Buhler, J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 BUH] (1).
|
|
64.
|
Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings
by Aucsmith, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
|
|
65.
|
State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997
by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
|
|
66.
|
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by Imai, Hideki | Zheng, Yuliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
|
|
67.
|
Physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation
by Bouwmeester, Dirk | Ekert, Artur | Zeilinger, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004.1 BOU] (1).
|
|
68.
|
Decrypted Secrets
by Bauer, Friedrich L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
|
|
69.
|
Course in number theory and cryptography
by Koblitz, Neal. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1994Availability: Items available for loan: [Call number: 512.7 KOB] (3).
|
|
70.
|
Internet Standards and Protocols
by Naik, Dilip C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 1998Availability: Items available for loan: [Call number: 004.678 NAI] (1).
|
|
71.
|
Digital signature : network security practices
by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
72.
|
Cryptography for Database and Internet Applications
by Galbreath, Nick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
|
|
73.
|
Practical cryptography
by Schneier, Bruce | Ferguson, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
74.
|
Cryptography in the database : the last line of defense
by Kenan, Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
|
|
75.
|
Practical Unix and Internet security
by Garfinkel, Simson. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 1996Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
76.
|
Java Examples in a Nutshell
by Flanagan, David. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 005.73 FLA] (1).
|
|
77.
|
C# web services : building web services with .NET remoting and ASP.NET
by Banerjee, Ashish and Others. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.276 BAN] (1).
|
|
78.
|
Web Security, Privacy and Commerce
by Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
79.
|
Java security
by Oaks, Scott. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2001Availability: Items available for loan: [Call number: 005.73 OAK] (1).
|
|
80.
|
Mathematics of ciphers : number theory and RSA cryptography
by Coutinho, S. C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hyderabad: Universities Press, 2003Availability: Items available for loan: [Call number: 512.7 COU] (1).
|