|
81.
|
Wireless security and cryptography : specifications and implementations
by Zhang, Xinmiao | Sklavos, Nicolas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).
|
|
82.
|
Data-driven block ciphers for fast telecommunication systems
by Moldovyan, Nikolay A | Moldovyan, Alexander A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
|
|
83.
|
Understanding and applying cryptography and data security
by Elbirt, Adam J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
|
|
84.
|
Applied algebra : codes, ciphers and discrete algorithms
by Hardy, Darel W | Richman, Fred | Walker, Carol L. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
|
|
85.
|
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
|
|
86.
|
Multiple-base number system : theory and applications
by Dimitrov, Vassil | Jullien, Graham | Muscedere, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 512.7 DIM] (1).
|
|
87.
|
Communication system security
by Chen, Lidong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 621.38928 CHE] (1).
|
|
88.
|
Computational number theory
by Das, Abhijit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
|
|
89.
|
Handbook of finite fields
by Mullen, Gary L | Panario, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.3 MUL] (1).
|
|
90.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
91.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
92.
|
Codes : the guide to secrecy from ancient to modern times
by Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
|
|
93.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|
|
94.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
95.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
96.
|
Steganography and watermarking
by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
97.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
98.
|
Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by Ioannidis, John | Keromytis, Angelos D | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
|
|
99.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
100.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|