61. Multimedia content encryption : techniques and applications

by Lian, Shiguo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
62. Introduction to cryptography with mathematical foundations and computer implementations

by Stanoyevitch, Alexander.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 STA] (1).
63. Computational number theory

by Das, Abhijit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
64. Cryptology : classical and modern with maplets

by Klima, Richard E | Sigmon, Neil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.82 KLI] (1).
65. Hardware security : design, threats, and safeguards

by Mukhopadhyay, Debdeep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
66. Encryption for digital content

by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
67. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
68. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
69. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
70. Stream ciphers

by Klein, Andreas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 005.82 KLE] (1).
71. Security and privacy for implantable medical devices

by Burleson, Wayne | Carrara, Sandro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 617.956 BUR] (1).
72. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
73. Secure messaging with PGP and S/MIME

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
74. Electronic payment systems for E-commerce

by O'Mahony, Donal.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 OMA] (1).
75. Foundations of security : what every programmer needs to know

by Daswani, Neil | Kern, Christoph | Kesavan, Anita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
76. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
77. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
78. Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting

by Skoric, Boris | Kevenaar, Tom | Tuyls, Pim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.82 TUY] (1).
79. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
80. Attribute-based credentials for trust : identity in the information society

by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).

Powered by Koha