|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Unsolved Problems in Coding Theory
by Joyner, David.
Publication:
. XII, 248p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards an Information Theory of Complex Networks
by Dehmer, Matthias.
Publication:
. XVI, 395p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Game Start!
by Alinovi, Francesco.
Publication:
. VII, 296 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Three-Dimensional Model Analysis and Processing
by Yu, Faxin.
Publication:
. 500p. 160 illus., 40 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Codes and Turbo Codes
by Berrou, Claude.
Publication:
. 400p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|