|
1.
|
Quantum cryptography using coherent states : randomized encryption and key generation
by Corndorf, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
2.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
3.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
4.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
5.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
6.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
7.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
8.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
9.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
10.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|