|
41.
|
Cryptographic security architecture : design and verification
by Gutmann, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
|
|
42.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
43.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
44.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
45.
|
Cryptography engineering : design principles and practical applications
by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
46.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
47.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
48.
|
Computer security and cryptography
by Konheim, Alan G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
|
|
49.
|
Elliptic curves in cryptography
by Blake, I. F | Seroussi, G | Smart, N. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
50.
|
Beginning cryptography with Java
by Hook, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
|
|
51.
|
Towards a quarter-century of public key cryptography
by Koblitz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
|
|
52.
|
Cryptography : an introduction
by Yashchenko, V. V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2002Availability: Items available for loan: [Call number: 005.82 YAS] (1).
|
|
53.
|
Data-driven block ciphers for fast telecommunication systems
by Moldovyan, Nikolay A | Moldovyan, Alexander A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
|
|
54.
|
Understanding and applying cryptography and data security
by Elbirt, Adam J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
|
|
55.
|
Applied algebra : codes, ciphers and discrete algorithms
by Hardy, Darel W | Richman, Fred | Walker, Carol L. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
|
|
56.
|
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
|
|
57.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
58.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
59.
|
Codes : the guide to secrecy from ancient to modern times
by Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
|
|
60.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|