1. Cryptography and data security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
2. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
3. Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland

by Garrett, Paul | Garrett, Paul | Lieman, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
4. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
5. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
6. Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 CHR] (1).
7. Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings

by Franklin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 FRA] (1).
8. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001: Proceedings

by Kim, Kwangjo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 KIM] (1).
9. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
10. Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings

by Naccache, David | Paillier,Pascal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
11. Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001

by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
12. Public-key cryptography

by Salomma, Arto.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
13. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
14. Cryptology unlocked

by Wobst, Reinhard | Shafir, Angelika.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
15. Elliptic curve public key cryptosystems

by Menezes, Alfred J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
16. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
17. Microsoft Windows 2000 Security

by Internet Security System Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
18. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
19. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).

Powered by Koha