|
1.
|
Quantum cryptography using coherent states : randomized encryption and key generation
by Corndorf, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
2.
|
Java cryptography extensions : practical guide for programmers.
by Weiss, Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2004Availability: Items available for loan: [Call number: 005.82 WEI] (1).
|
|
3.
|
Classical and contemporary cryptology
by Spillman, Richard J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 652.8 SPI] (2).
|
|
4.
|
Introduction to cryptography with coding theory
by Trappe, Wade | Washington, Lawrence C. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.82 TRA] (1).
|
|
5.
|
Crypto : how the code rebels beat the government - saving privacy in the digital age
by Levy, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
|
|
6.
|
Codes and cryptography
by Welsh, Dominic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford: Clarendon press, 2000Availability: Items available for loan: [Call number: 005.82 WEL] (1).
|
|
7.
|
Computers Ltd : what they really can't do
by Harel, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 004 HAR] (1).
|
|
8.
|
Cryptography and data security
by Denning, Dorothy E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
|
|
9.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
10.
|
Practical cryptology and web security.
by Yuen, P. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.82 YUE] (1).
|
|
11.
|
Introduction to cryptography
by Buchmann, Johannes A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BUC] (1).
|
|
12.
|
Internet security : cryptographic principles, algorithms, and protocols
by Rhee, Man Young. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
|
|
13.
|
Cryptography, information theory, and error-correction : a handbook for the twenty first century
by Bruen, Aiden A | Forcinito, Mario A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
14.
|
Primes and programming : an introduction to number theory with computing
by Giblin, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1997Availability: Items available for loan: [Call number: 512.72 GIB] (1).
|
|
15.
|
Complexity and cryptography : an introduction
by Talbot, John | Welsh, Dominic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 TAL] (1).
|
|
16.
|
Quantum cryptography and secret-key distillation
by Van Assche, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 VAN] (1).
|
|
17.
|
Introduction to cryptography with Java applets
by Bishop, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
18.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
19.
|
Contemporary cryptology : the science of information integrity
by Simmons, Gustavus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
|
|
20.
|
Cryptography and computational number theory
by Pomerance, Carl | Pomerance, Carl. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 1990Availability: Items available for loan: [Call number: 005.8 POM] (1).
|