61. Public-key cryptography

by Salomma, Arto.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
62. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
63. Algorithmic Number Theory

by Buhler, J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 BUH] (1).
64. Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings

by Aucsmith, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
65. State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997

by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
66. Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999

by Imai, Hideki | Zheng, Yuliang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
67. Physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation

by Bouwmeester, Dirk | Ekert, Artur | Zeilinger, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004.1 BOU] (1).
68. Decrypted Secrets

by Bauer, Friedrich L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
69. Course in number theory and cryptography

by Koblitz, Neal.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1994Availability: Items available for loan: [Call number: 512.7 KOB] (3).
70. Internet Standards and Protocols

by Naik, Dilip C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 1998Availability: Items available for loan: [Call number: 004.678 NAI] (1).
71. Digital signature : network security practices

by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
72. Cryptography for Database and Internet Applications

by Galbreath, Nick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
73. Practical cryptography

by Schneier, Bruce | Ferguson, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
74. Cryptography in the database : the last line of defense

by Kenan, Kevin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
75. Practical Unix and Internet security

by Garfinkel, Simson.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 1996Availability: Items available for loan: [Call number: 005.8 GAR] (1).
76. Java Examples in a Nutshell

by Flanagan, David.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 005.73 FLA] (1).
77. C# web services : building web services with .NET remoting and ASP.NET

by Banerjee, Ashish and Others.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.276 BAN] (1).
78. Web Security, Privacy and Commerce

by Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
79. Java security

by Oaks, Scott.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2001Availability: Items available for loan: [Call number: 005.73 OAK] (1).
80. Mathematics of ciphers : number theory and RSA cryptography

by Coutinho, S. C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hyderabad: Universities Press, 2003Availability: Items available for loan: [Call number: 512.7 COU] (1).

Powered by Koha