1. Concurrent zero knowledge

by Rosen, Alon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2006Availability: Items available for loan: [Call number: 005.8 ROS] (1).
2. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
3. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
4. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
5. LLL algorithm : survey and applications

by Nguyen, Phong Q | Vallee, Brigitte.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2010Availability: Items available for loan: [Call number: 518.1 NGU] (1).
6. Secure data deletion

by Reardon, Joel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
7. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
8. Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications

by Schwenk, Jörg.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 929 SCH] (1).

Powered by Koha