1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
3. Brute force : cracking the data encryption standard

by Curtin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
4. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
5. Implementing SSH : strategies for optimizing the secure shell

by Dwivedi, Himanshu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
6. Basic methods of cryptography

by Gee, Steve | Lubbe, J. C. A. van der.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1998Availability: Items available for loan: [Call number: 005.82 LUB] (1).
7. Quantum cryptography and secret-key distillation

by Van Assche, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 VAN] (1).
8. Mathematics of data/image coding, compression, and encryption VI, with applications : 5 and 7 August 2003, San Diego, California, USA

by Schmalz, Mark S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: SPIE, 2004Availability: Items available for loan: [Call number: 005.746 SCH] (1).
9. Quantum communications and cryptography

by Sergienko, Alexander V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
10. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
11. Code book : the secret history of codes and codebreaking

by Singh, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Fourth Estate, 2000Availability: Items available for loan: [Call number: 652.8 SIN] (1).
12. Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings

by Zhou, Jianying | Han, Youngfei | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
13. Concurrent zero knowledge

by Rosen, Alon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2006Availability: Items available for loan: [Call number: 005.8 ROS] (1).
14. Design of rijndael : AES -- the advanced encryption standard

by Rijmen, Vincent | Daemen, Joan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2002Availability: Items available for loan: [Call number: 005.8 DAE] (1).
15. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
16. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
17. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
18. Coding theorems of classical and quantum information theory

by Parthasarathy, K. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Hindustan Book Agency, 2007Availability: Items available for loan: [Call number: 003.54 PAR] (1).
19. Cryptonomicon

by Stephenson, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Avon Books, 2002Availability: Items available for loan: [Call number: 813.54 STE] (1).
20. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).

Powered by Koha