|
1.
|
Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings
by Zhou, Jianying | Han, Youngfei | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
|
|
2.
|
Concurrent zero knowledge
by Rosen, Alon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2006Availability: Items available for loan: [Call number: 005.8 ROS] (1).
|
|
3.
|
Design of rijndael : AES -- the advanced encryption standard
by Rijmen, Vincent | Daemen, Joan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2002Availability: Items available for loan: [Call number: 005.8 DAE] (1).
|
|
4.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
5.
|
Cryptographics : exploiting graphics cards for security
by Keromytis, Angelos D | Cook, Debra L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
|
|
6.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
7.
|
Cryptographic engineering
by Koc, Cetin Kaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
|
|
8.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
9.
|
Multimedia data hiding
by Wu, Min | Liu, Bede. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
|
|
10.
|
Encryption for digital content
by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
|
|
11.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
12.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
13.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
14.
|
Stream ciphers
by Klein, Andreas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 005.82 KLE] (1).
|
|
15.
|
Security and privacy for implantable medical devices
by Burleson, Wayne | Carrara, Sandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 617.956 BUR] (1).
|
|
16.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
17.
|
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by Skoric, Boris | Kevenaar, Tom | Tuyls, Pim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.82 TUY] (1).
|
|
18.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
19.
|
Attribute-based credentials for trust : identity in the information society
by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
|
|
20.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|