|
61.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
62.
|
Security of information and communication networks
by Kartalopoulos, Stamatios V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
|
|
63.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
64.
|
Steganography in digital media : principles, algorithms, and applications
by Fridrich, Jessica. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2010Availability: Items available for loan: [Call number: 005.82 FRI] (1).
|
|
65.
|
Writing secure code
by Howard, Michael | LeBlanc, David. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Microsoft Press, 2002Availability: Items available for loan: [Call number: 005.8 HOW] (2).
|
|
66.
|
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
|
|
67.
|
Mathematics of encryption : an elementary introduction
by Cozzens, Margaret | Miller, Steven J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2013Availability: Items available for loan: [Call number: 652.80151 COZ] (1).
|
|
68.
|
Handbook of financial cryptography and security
by Rosenberg, Burton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
|
|
69.
|
Multimedia content encryption : techniques and applications
by Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
|
|
70.
|
Introduction to cryptography with mathematical foundations and computer implementations
by Stanoyevitch, Alexander. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
71.
|
Computational number theory
by Das, Abhijit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
|
|
72.
|
Cryptology : classical and modern with maplets
by Klima, Richard E | Sigmon, Neil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.82 KLI] (1).
|
|
73.
|
Hardware security : design, threats, and safeguards
by Mukhopadhyay, Debdeep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
|
|
74.
|
Encryption for digital content
by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
|
|
75.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
76.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
77.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
78.
|
Stream ciphers
by Klein, Andreas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 005.82 KLE] (1).
|
|
79.
|
Security and privacy for implantable medical devices
by Burleson, Wayne | Carrara, Sandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 617.956 BUR] (1).
|
|
80.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|