81. Secure messaging with PGP and S/MIME

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
82. Electronic payment systems for E-commerce

by O'Mahony, Donal.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 OMA] (1).
83. Foundations of security : what every programmer needs to know

by Daswani, Neil | Kern, Christoph | Kesavan, Anita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
84. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
85. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
86. Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting

by Skoric, Boris | Kevenaar, Tom | Tuyls, Pim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.82 TUY] (1).
87. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
88. Attribute-based credentials for trust : identity in the information society

by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
89. Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers

by Morsch, Oliver.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Weinheim: Wiley-VCH, 2008Availability: Items available for loan: [Call number: 005.82 MOR] (1).
90. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
91. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
92. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
93. Security, privacy and trust in modern data management

by Petkovic, Milan | Jonker, Willem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
94. Post quantum cryptography

by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
95. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
96. Information hiding and applications

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
97. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
98. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
99. Applied quantum cryptography

by Kollmitzer, Christian | Pivk, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
100. Trust Management IV

by Nishigaki, Masakatsu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).

Powered by Koha