|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
by Armando, Alessandro.
Publication:
. IX, 185p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XI, 297p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 172p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Jha, Somesh.
Publication:
. 524p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Vinel, Alexey.
Publication:
. XIII, 287p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Katsikas, Sokratis.
Publication:
. XII, 252p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – LATINCRYPT 2010
by Abdalla, Michel.
Publication:
. XII, 323p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. XII, 432p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Number Theory
by Hanrot, Guillaume.
Publication:
. XI, 397p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|