|
1.
|
Quantum cryptography using coherent states : randomized encryption and key generation
by Corndorf, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
2.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
3.
|
Brute force : cracking the data encryption standard
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
|
|
4.
|
Algebraic aspects of the advanced encryption standard.
by Cid, Carlos | Murphy, Sean | Robshaw, Mathhew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 CID] (1).
|
|
5.
|
Internet security : cryptographic principles, algorithms, and protocols
by Rhee, Man Young. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
|
|
6.
|
Implementing SSH : strategies for optimizing the secure shell
by Dwivedi, Himanshu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
7.
|
Basic methods of cryptography
by Gee, Steve | Lubbe, J. C. A. van der. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1998Availability: Items available for loan: [Call number: 005.82 LUB] (1).
|
|
8.
|
Quantum cryptography and secret-key distillation
by Van Assche, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 VAN] (1).
|
|
9.
|
Mathematics of data/image coding, compression, and encryption VI, with applications : 5 and 7 August 2003, San Diego, California, USA
by Schmalz, Mark S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: SPIE, 2004Availability: Items available for loan: [Call number: 005.746 SCH] (1).
|
|
10.
|
Quantum communications and cryptography
by Sergienko, Alexander V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
|
|
11.
|
IM, instant messaging security
by Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
|
|
12.
|
Non-Repudiation in electronic commerce
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
|
|
13.
|
Code book : the secret history of codes and codebreaking
by Singh, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Fourth Estate, 2000Availability: Items available for loan: [Call number: 652.8 SIN] (1).
|
|
14.
|
Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings
by Qing, Sihan | Gollmann, Dieter | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 QIN] (1).
|
|
15.
|
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by Boyd, Colin | Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
|
|
16.
|
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by Lioy, Antonio | Mazzocchi, Daniele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
|
|
17.
|
Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings
by Zhou, Jianying | Han, Youngfei | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
|
|
18.
|
Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
19.
|
Foundations of Security Analysis and Design II : FOSAD 2001/2002 Turorial Lectures
by Focardi, Riccardo | Gorrieri, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 FOC] (1).
|
|
20.
|
Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 ; proceedings
by Jakobsson, Markus | Yung, Moti | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JAK] (1).
|