|
81.
|
Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers
by Morsch, Oliver. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Weinheim: Wiley-VCH, 2008Availability: Items available for loan: [Call number: 005.82 MOR] (1).
|
|
82.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
83.
|
Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by Ioannidis, John | Keromytis, Angelos D | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
|
|
84.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
85.
|
Security, privacy and trust in modern data management
by Petkovic, Milan | Jonker, Willem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
|
|
86.
|
Post quantum cryptography
by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
|
|
87.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
88.
|
Information hiding and applications
by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
|
|
89.
|
Quantum private communication
by Zeng, Guihua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
90.
|
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof | Pelzl, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
|
|
91.
|
Applied quantum cryptography
by Kollmitzer, Christian | Pivk, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
|
|
92.
|
Trust Management IV
by Nishigaki, Masakatsu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
|
|
93.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
94.
|
Hash function BLAKE
by Aumasson, Jean-Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
|
|
95.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
96.
|
Encryption : protecting your data
by Fadia, Ankit | Bhattacharjee, Jaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
97.
|
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof | Pelzl, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
|
|
98.
|
SSH, the secure shell : the definitive guide
by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
99.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
|
|
100.
|
Coding theorems of classical and quantum information theory
by Parthasarathy, K. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Hindustan Book Agency, 2013Availability: Items available for loan: [Call number: 530.12 PAR] (1).
|