21. Cryptographic boolean functions and applications

by Cusick, Thomas W | Stanica, Pantelimon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
22. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
23. Surveillance or security? : the risks posed by new wiretapping technologies

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
24. Burdens of proof : cryptographic culture and evidence law in the age of electronic documents

by Blanchette, Jean-Franc�ois.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2012Availability: Items available for loan: [Call number: 347.064 BLA] (1).
25. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
26. Privacy on the line : the politics of wiretapping and encryption

by Diffie, Whitfield | Landau, Susan.

Edition: Updated & expanded ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2007Availability: Items available for loan: [Call number: 342.730858 DIF] (1).
27. Labyrinth key

by Hendrix, Howard V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Ballantine Books, 2004Availability: Items available for loan: [Call number: 813.54 HEN] (1).
28. Cryptographics : exploiting graphics cards for security

by Keromytis, Angelos D | Cook, Debra L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
29. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
30. Cryptographic engineering

by Koc, Cetin Kaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
31. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
32. Multimedia data hiding

by Wu, Min | Liu, Bede.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
33. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
34. Security of information and communication networks

by Kartalopoulos, Stamatios V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
35. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
36. Steganography in digital media : principles, algorithms, and applications

by Fridrich, Jessica.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2010Availability: Items available for loan: [Call number: 005.82 FRI] (1).
37. Writing secure code

by Howard, Michael | LeBlanc, David.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Microsoft Press, 2002Availability: Items available for loan: [Call number: 005.8 HOW] (2).
38. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
39. Mathematics of encryption : an elementary introduction

by Cozzens, Margaret | Miller, Steven J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2013Availability: Items available for loan: [Call number: 652.80151 COZ] (1).
40. Handbook of financial cryptography and security

by Rosenberg, Burton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).

Powered by Koha