//]]>
Cryptology and Network Security by Heng, Swee-Huay. Publication: . XIII, 355p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Unsolved Problems in Coding Theory by Joyner, David. Publication: . XII, 248p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards an Information Theory of Complex Networks by Dehmer, Matthias. Publication: . XVI, 395p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Start! by Alinovi, Francesco. Publication: . VII, 296 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Three-Dimensional Model Analysis and Processing by Yu, Faxin. Publication: . 500p. 160 illus., 40 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Codes and Turbo Codes by Berrou, Claude. Publication: . 400p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Identity-Based Encryption by Chatterjee, Sanjit. Publication: . XI, 182p. 19 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2