|
41.
|
Multimedia content encryption : techniques and applications
by Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
|
|
42.
|
Introduction to cryptography with mathematical foundations and computer implementations
by Stanoyevitch, Alexander. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
43.
|
Computational number theory
by Das, Abhijit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
|
|
44.
|
Cryptology : classical and modern with maplets
by Klima, Richard E | Sigmon, Neil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.82 KLI] (1).
|
|
45.
|
Hardware security : design, threats, and safeguards
by Mukhopadhyay, Debdeep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
|
|
46.
|
Encryption for digital content
by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
|
|
47.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
48.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
49.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
50.
|
Stream ciphers
by Klein, Andreas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 005.82 KLE] (1).
|
|
51.
|
Security and privacy for implantable medical devices
by Burleson, Wayne | Carrara, Sandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 617.956 BUR] (1).
|
|
52.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
53.
|
Secure messaging with PGP and S/MIME
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
54.
|
Electronic payment systems for E-commerce
by O'Mahony, Donal. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 OMA] (1).
|
|
55.
|
Foundations of security : what every programmer needs to know
by Daswani, Neil | Kern, Christoph | Kesavan, Anita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
|
|
56.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
57.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
58.
|
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by Skoric, Boris | Kevenaar, Tom | Tuyls, Pim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.82 TUY] (1).
|
|
59.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
60.
|
Attribute-based credentials for trust : identity in the information society
by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
|