101. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
102. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
103. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
104. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
105. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
106. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
107. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
108. Proceedings of the first international workshop on coding and cryptology

by Li, Yongqing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
109. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
110. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
111. Microsoft Windows 2000 Security

by Internet Security System Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
112. Handbook of security, cryptography and digital signature

by Bhaskar, S. M | Ramachandran, P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
113. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
114. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
115. Web security

by Chen, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
116. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
117. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
118. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
119. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
120. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).

Powered by Koha