101. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
102. Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

by Snekkenes, Einar | Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 SNE] (1).
103. Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers

by Johansson, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
104. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
105. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
106. Secure data deletion

by Reardon, Joel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
107. Symmetric cryptographic protocols

by Ramkumar, Mahalingam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
108. Listening in : cybersecurity in an insecure age

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.16​8 LAN] (1).
109. Random numbers and computers

by Kneusel, Ronald T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518 KNE] (1).
110. Circuits and systems for security and privacy

by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
111. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
112. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
113. Implementing SSL/​TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
114. Cryptography and secure communication

by Blahut, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
115. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
116. Topics in cryptology - CT-RSA 2016 : the Cryptographers' Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

by Sako, Kazue.

Publisher: Berlin Springer 2016Availability: Items available for loan: [Call number: 005.82 SAK] (1).
117. Functional encryption

by Ahmad, Khairol Amali Bin | Ahmad, Khaleel | Dulhare, Uma N.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 621.382 AHM] (1).
118. Quantum cryptography : from key distribution to conference key agreement

by Grasselli, Federico.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
119. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
120. Design and analysis of cryptographic algorithms in blockchain

by Huang, Ke | Mu, Yi | Rezaeibagha, Fatemeh | Zhang, Xiaosong.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.824 HUA] (1).

Powered by Koha