81. Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers

by Morsch, Oliver.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Weinheim: Wiley-VCH, 2008Availability: Items available for loan: [Call number: 005.82 MOR] (1).
82. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
83. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
84. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
85. Security, privacy and trust in modern data management

by Petkovic, Milan | Jonker, Willem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
86. Post quantum cryptography

by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
87. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
88. Information hiding and applications

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
89. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
90. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
91. Applied quantum cryptography

by Kollmitzer, Christian | Pivk, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
92. Trust Management IV

by Nishigaki, Masakatsu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
93. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
94. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
95. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
96. Encryption : protecting your data

by Fadia, Ankit | Bhattacharjee, Jaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
97. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
98. SSH, the secure shell : the definitive guide

by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
99. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
100. Coding theorems of classical and quantum information theory

by Parthasarathy, K. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Hindustan Book Agency, 2013Availability: Items available for loan: [Call number: 530.12 PAR] (1).

Powered by Koha