161. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
162. Optical coding theory with prime

by Kwong, Wing C | Yang, Guu-Chang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 003.54 KWO] (1).
163. Introduction to number theory with cryptography

by Kraft, James S | Washington, Lawrence C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 512.7 KRA] (1).
164. Computing : a historical and technical perspective

by Igarashi, Yoshihide.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 004 IGA] (1).
165. Introduction to mathematical cryptography

by Hoffstein, Jeffrey | Pipher, Jill Catherine | Silverman, Joseph H.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 652.80151 HOF] (1).
166. Elliptic curves : number theory and cryptography

by Washington, Lawrence C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 516.352 WAS] (1).
167. Codes : the guide to secrecy from ancient to modern times

by Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
168. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: No items available Checked out (1).
169. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
170. Web application obfuscation

by Heiderich, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
171. Steganography and watermarking

by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
172. Codes : an introduction to information communication and cryptography

by Biggs, Norman L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2008Availability: Items available for loan: [Call number: 003.54 BIG] (1).
173. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
174. Construction and analysis of cryptographic functions

by Budaghyan, Lilya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2014Availability: Items available for loan: [Call number: 515.5 BUD] (1).
175. Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers

by Morsch, Oliver.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Weinheim: Wiley-VCH, 2008Availability: Items available for loan: [Call number: 005.82 MOR] (1).
176. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
177. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
178. Modern cryptography, probalistic proofs and pseudorandomness

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 005.82 GOL] (1).
179. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
180. Algorithmic adventures : from knowledge to magic

by Hromkovic, Juraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.1 HRO] (1).

Powered by Koha