|
|
Internet and Network Economics
by Chen, Ning.
Publication:
. XII, 420 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Optimization
by Pahl, Julia.
Publication:
. XIV, 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Models for the Web Graph
by Frieze, Alan.
Publication:
. IX, 127p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2011
by Paterson, Kenneth G.
Publication:
. XIV, 628p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2011
by Catalano, Dario.
Publication:
. XIII, 495p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Saberi, Amin.
Publication:
. X, 580p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIV, 614p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|