|
101.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
102.
|
Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings
by Snekkenes, Einar | Gollmann, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 SNE] (1).
|
|
103.
|
Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers
by Johansson, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
|
|
104.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
105.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
106.
|
Secure data deletion
by Reardon, Joel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
|
|
107.
|
Symmetric cryptographic protocols
by Ramkumar, Mahalingam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
|
|
108.
|
Listening in : cybersecurity in an insecure age
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.168 LAN] (1).
|
|
109.
|
Random numbers and computers
by Kneusel, Ronald T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518 KNE] (1).
|
|
110.
|
Circuits and systems for security and privacy
by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
|
|
111.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
112.
|
Security of block ciphers : from algorithm design to hardware implementation
by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
113.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
114.
|
Cryptography and secure communication
by Blahut, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
115.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
116.
|
Topics in cryptology - CT-RSA 2016 : the Cryptographers' Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
by Sako, Kazue. Publisher: Berlin Springer 2016Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
117.
|
Functional encryption
by Ahmad, Khairol Amali Bin | Ahmad, Khaleel | Dulhare, Uma N. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 621.382 AHM] (1).
|
|
118.
|
Quantum cryptography : from key distribution to conference key agreement
by Grasselli, Federico. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
|
|
119.
|
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by Jarvis, Craig. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
|
|
120.
|
Design and analysis of cryptographic algorithms in blockchain
by Huang, Ke | Mu, Yi | Rezaeibagha, Fatemeh | Zhang, Xiaosong. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.824 HUA] (1).
|