|
1.
|
Internet security : cryptographic principles, algorithms, and protocols
by Rhee, Man Young. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
|
|
2.
|
Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
by Garrett, Paul | Garrett, Paul | Lieman, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
|
|
3.
|
RSA and public-key cryptography
by Mollin, Richard | Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
|
|
4.
|
Applied public key infrastructure : 4th International Workshop : IWAP 2005
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
|
|
5.
|
Lectures on data security : modern cryptology in theory and practice
by Damgard, Ivan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1990Availability: Items available for loan: [Call number: 004 DAM] (1).
|
|
6.
|
Introduction to Cryptography
by Delfs, Hans. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
7.
|
Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings
by Naccache, David | Paillier,Pascal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
|
|
8.
|
Public-key cryptography
by Salomma, Arto. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
|
|
9.
|
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by Imai, Hideki | Zheng, Yuliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
|
|
10.
|
Cryptography for Database and Internet Applications
by Galbreath, Nick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
|
|
11.
|
RSA Security's Official Guide to Cryptography
by Burnett, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BUR] (2).
|
|
12.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
13.
|
Towards a quarter-century of public key cryptography
by Koblitz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
|
|
14.
|
Elliptic curve public key cryptosystems
by Menezes, Alfred J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
|
|
15.
|
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
|
|
16.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
17.
|
Computing : a historical and technical perspective
by Igarashi, Yoshihide. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 004 IGA] (1).
|
|
18.
|
Codes : the guide to secrecy from ancient to modern times
by Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
|
|
19.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
20.
|
Public-key cryptography : theory and practice
by Das, Abhijit | Madhavan, C. E. Veni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
|