|
21.
|
Fundamentals of computer security
by Pieprzyk, Josef. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.8 PIE] (1).
|
|
22.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
23.
|
Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings
by Naccache, David | Paillier,Pascal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
|
|
24.
|
Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001
by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
25.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
26.
|
State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997
by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
|
|
27.
|
Decrypted Secrets
by Bauer, Friedrich L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
|
|
28.
|
Digital signature : network security practices
by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
29.
|
Practical cryptography
by Schneier, Bruce | Ferguson, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
30.
|
Web Security, Privacy and Commerce
by Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
31.
|
Cryptography in C and C++
by Welschenbach, Michael | Kramer, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
|
|
32.
|
Basics of contemporary cryptography for IT practitioners
by Ryabko, Boris | Fionov, Andrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
|
|
33.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
34.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
35.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
36.
|
NET security and cryptography
by Thorsteinson, Peter | Ganesh, G. Gnana Arun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
|
|
37.
|
Cryptography Decrypted
by Mel, H. X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
|
|
38.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
39.
|
Classical introduction to cryptography : applications for communications security
by Vaudenay, Serge. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
|
|
40.
|
Classical introduction to cryptography exercise book
by Baigneres, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
|