1. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
2. Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland

by Garrett, Paul | Garrett, Paul | Lieman, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
3. RSA and public-key cryptography

by Mollin, Richard | Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
4. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
5. Lectures on data security : modern cryptology in theory and practice

by Damgard, Ivan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1990Availability: Items available for loan: [Call number: 004 DAM] (1).
6. Introduction to Cryptography

by Delfs, Hans.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 005.82 DEL] (1).
7. Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings

by Naccache, David | Paillier,Pascal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
8. Public-key cryptography

by Salomma, Arto.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
9. Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999

by Imai, Hideki | Zheng, Yuliang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
10. Cryptography for Database and Internet Applications

by Galbreath, Nick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
11. RSA Security's Official Guide to Cryptography

by Burnett, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BUR] (2).
12. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
13. Towards a quarter-century of public key cryptography

by Koblitz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
14. Elliptic curve public key cryptosystems

by Menezes, Alfred J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
15. Cryptanalysis of RSA and its variants

by Hinek, M. Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
16. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
17. Computing : a historical and technical perspective

by Igarashi, Yoshihide.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 004 IGA] (1).
18. Codes : the guide to secrecy from ancient to modern times

by Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
19. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
20. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).

Powered by Koha