|
101.
|
Quantum private communication
by Zeng, Guihua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
102.
|
Handbook of information and communication security
by Stavroulakis, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
103.
|
Hash function BLAKE
by Aumasson, Jean-Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
|
|
104.
|
Information security : theory and practice
by Patel, Dhiren R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
|
|
105.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
106.
|
Security engineering: a guide to building dependable distributed systems
by Anderson, Ross J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
|
|
107.
|
Public-key cryptography : theory and practice
by Das, Abhijit | Madhavan, C. E. Veni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
|
|
108.
|
Proceedings of the first international workshop on coding and cryptology
by Li, Yongqing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
|
|
109.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|
|
110.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
111.
|
Microsoft Windows 2000 Security
by Internet Security System Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
|
|
112.
|
Handbook of security, cryptography and digital signature
by Bhaskar, S. M | Ramachandran, P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
|
|
113.
|
Applied cryptography : protocols, algorithms and source code in C
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
|
|
114.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
115.
|
Web security
by Chen, Thomas M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
116.
|
Understanding the digital world : what you need to know about computers, the internet, privacy, and security
by Kernighan, Brian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
|
|
117.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
118.
|
Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project
by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
|
|
119.
|
Mathematics of secrets : cryptography from caesar ciphers to digital encryption
by Holden, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
|
|
120.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|