181. Grobner bases, coding, and cryptography

by Sala, Massimiliano.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 512.44 SAL] (1).
182. LLL algorithm : survey and applications

by Nguyen, Phong Q | Vallee, Brigitte.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2010Availability: Items available for loan: [Call number: 518.1 NGU] (1).
183. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
184. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
185. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
186. Applied quantum cryptography

by Kollmitzer, Christian | Pivk, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
187. Fundamentals in information theory and coding

by Borda, Monica.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 003.54 BOR] (1).
188. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
189. Design and Analysis of Algorithms

by Panneerselvam, R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.1 PAN] (1).
190. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
191. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
192. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
193. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
194. Introduction to cryptography with coding theory

by Trappe, Wade | Washington, Lawrence C.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 005.82 TRA] (7).
195. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
196. Computer networks

by Vijayakumar, B. P | Manvi, Sunilkumar S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2009Availability: Items available for loan: [Call number: 004.6 MAN] (1).
197. Advances in coding theory and crytography

by Shaska, Tanush.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 SHA] (1).
198. Proceedings of the first international workshop on coding and cryptology

by Li, Yongqing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
199. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
200. VPNs illustrated : tunnels, VPNs, and IPsec

by Snader, Jon C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 004.678 SNA] (1).

Powered by Koha