41. Cryptographic security architecture : design and verification

by Gutmann, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
42. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
43. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
44. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
45. Cryptography engineering : design principles and practical applications

by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
46. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
47. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
48. Computer security and cryptography

by Konheim, Alan G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
49. Elliptic curves in cryptography

by Blake, I. F | Seroussi, G | Smart, N. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
50. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
51. Towards a quarter-century of public key cryptography

by Koblitz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
52. Cryptography : an introduction

by Yashchenko, V. V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2002Availability: Items available for loan: [Call number: 005.82 YAS] (1).
53. Data-driven block ciphers for fast telecommunication systems

by Moldovyan, Nikolay A | Moldovyan, Alexander A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
54. Understanding and applying cryptography and data security

by Elbirt, Adam J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
55. Applied algebra : codes, ciphers and discrete algorithms

by Hardy, Darel W | Richman, Fred | Walker, Carol L.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
56. Cryptanalysis of RSA and its variants

by Hinek, M. Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
57. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
58. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
59. Codes : the guide to secrecy from ancient to modern times

by Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
60. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).

Powered by Koha