1. Security in Pervasive Computing : First International Conference, Boppard, Germany, March 12-14, 2003 : Revised Papers

by Hutter, Dieter | Muller, Gunter | Stephan, Werner | Ullmann, Markus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 HUT] (1).
2. Topics in Cryptology--CT-RSA 2004 : the Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004 : proceedings

by Okamoto, Tatsuaki.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 OKA] (1).
3. Digital signature : network security practices

by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
4. Java security

by Oaks, Scott.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2001Availability: Items available for loan: [Call number: 005.73 OAK] (1).
5. Handbook of applied cryptography

by Menezes, Alfred J | Oorschot, Paul C. Van | Vanstone, Scott A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: CRC Press, 1997Availability: Items available for loan: [Call number: 005.82 MEN] (1).
6. Handbook of security, cryptography and digital signature

by Bhaskar, S. M | Ramachandran, P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
7. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
8. Probabilistic and biologically inspired feature representations

by Felsberg, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.L. : Morgan & Claypool Publishers, 2018Availability: Items available for loan: [Call number: 006.37 FEL] (1).
9. Quantum computing and Blockchain in business : exploring the applications, challenges, and collision of quantum computing and blockchain

by Krishnakumar, Arunkumar.

Publisher: Mumbai : Packt Publishing, 2020Availability: Items available for loan: [Call number: 658.514 KRI] (1).
10. Functional encryption

by Ahmad, Khairol Amali Bin | Ahmad, Khaleel | Dulhare, Uma N.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 621.382 AHM] (1).
11. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
12. Computational cryptography : algorithmic aspects of cryptology

by Bos, Joppe W. ed | Stam, Martijn [ed.].

Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.824 BOS] (1).
13. Corporate brand design : developing and managing brand identity

by Foroudi, Mohammad Mahdi | Foroudi, Pantea.

Publisher: Abingdon : Routledge, 2022Availability: Items available for loan: [Call number: 658.827 FOR] (1).
14. Practical mathematical cryptography

by Gjosteen, Kristian.

Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).

Powered by Koha