1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Crypto : how the code rebels beat the government - saving privacy in the digital age

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
3. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
4. Practical cryptology and web security.

by Yuen, P. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.82 YUE] (1).
5. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
6. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
7. Introduction to cryptography with Java applets

by Bishop, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
8. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
9. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
10. Quantum communications and cryptography

by Sergienko, Alexander V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
11. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
12. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
13. Cryptanalysis of Number Theoretic Ciphers

by Wagstaff, Samuel S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
14. RSA and public-key cryptography

by Mollin, Richard | Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
15. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
16. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
17. Cryptographic hardware and embedded systems - CHES 2002: 4th international workshop Redwood shores, CA, USA, August 13-15, 2002 revised papers

by Kaliski, Burton S | Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 KAL] (1).
18. Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding

by Lioy, Antonio | Mazzocchi, Daniele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
19. Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings

by Zhou, Jianying | Han, Youngfei | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
20. Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers

by Chae, Kijoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).

Powered by Koha