61. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
62. Web application obfuscation

by Heiderich, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
63. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
64. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
65. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
66. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
67. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
68. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
69. Proceedings of the first international workshop on coding and cryptology

by Li, Yongqing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
70. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
71. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
72. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
73. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
74. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
75. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
76. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
77. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
78. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
79. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
80. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).

Powered by Koha