1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Cryptography and data security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
3. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
4. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
5. Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers

by Chae, Kijoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
6. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
7. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
8. Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings

by Aucsmith, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
9. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
10. Encyclopedia of cryptography and security

by Tilborg, Henk C. A. van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
11. Cryptology unlocked

by Wobst, Reinhard | Shafir, Angelika.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
12. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
13. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
14. Privacy is hard and seven other myths : achieving privacy through careful design

by Hoepman, Jaap-Henk.

Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).

Powered by Koha