1. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
2. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
3. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
4. Digital signatures

by Atreya, Mohan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
5. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
6. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
7. Maximum security

by Anonymous.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
8. Trust and security in collaborative computing

by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
9. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
10. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Publisher: New York Cambridge University Press 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).

Powered by Koha