|
1.
|
ASN.1 communication between heterogeneous systems
by Dubuisson, Olivier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
|
|
2.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
3.
|
Network and parallel computing : IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, proceedings
by Hai, Jin | Chen, Hao | Gao, Guang R | Xu, Zhiwei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JIN] (1).
|
|
4.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
5.
|
Computer networking with internet protocols and technology
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 004.678 STA] (1).
|
|
6.
|
SSL and TLS : designing and building secure systems
by Rescorla, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
|
|
7.
|
Rethinking public key infrastructures and digital certificates: Building in privacy
by Brands, Stefan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
|
|
8.
|
Protocol : how control exists after decentralization
by Galloway, Alexander R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
9.
|
Secure key establishment
by Choo, Kim-Kwang Raymond. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
|
|
10.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
11.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
12.
|
Delay-and Disruption-Tolerant Networking
by Farrell, Stephen | Cahill, Vinny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
|
|
13.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
14.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
15.
|
Principles of protocol design
by Sharp, Robin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2008Availability: Items available for loan: [Call number: 004.62 SHA] (1).
|
|
16.
|
Network algorithmics : an interdisciplinary approach to designing fast networked devices
by Varghese, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 004.62 VAR] (1).
|
|
17.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
18.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
19.
|
SCION : a secure internet architecture
by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
|
|
20.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|