21. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.8 PIE] (1).
22. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
23. Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings

by Naccache, David | Paillier,Pascal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
24. Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001

by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
25. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
26. State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997

by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
27. Decrypted Secrets

by Bauer, Friedrich L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
28. Digital signature : network security practices

by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
29. Practical cryptography

by Schneier, Bruce | Ferguson, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
30. Web Security, Privacy and Commerce

by Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
31. Cryptography in C and C++

by Welschenbach, Michael | Kramer, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
32. Basics of contemporary cryptography for IT practitioners

by Ryabko, Boris | Fionov, Andrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
33. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
34. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
35. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
36. NET security and cryptography

by Thorsteinson, Peter | Ganesh, G. Gnana Arun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
37. Cryptography Decrypted

by Mel, H. X.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
38. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
39. Classical introduction to cryptography : applications for communications security

by Vaudenay, Serge.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
40. Classical introduction to cryptography exercise book

by Baigneres, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).

Powered by Koha