|
|
Locally Decodable Codes and Private Information Retrieval Schemes
by Yekhanin, Sergey.
Publication:
. XII, 82 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Efficient Secure Two-Party Protocols
by Hazay, Carmit.
Publication:
. XIII, 263 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer and Computing Technologies in Agriculture III
by Li, Daoliang.
Publication:
. XV, 561p. 246 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XVI, 915p. 450 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations
by Wu, Yanwen.
Publication:
. Approx. 110 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Digital Forensics
by Weerasinghe, Dasun.
Publication:
. 196p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding Cryptography
by Paar, Christof.
Publication:
. XVIII, 372p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The LLL Algorithm
by Nguyen, Phong Q.
Publication:
. XIV, 496 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Practical Signcryption
by Dent, Alexander W.
Publication:
. XVIII, 274 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Operational Semantics and Verification of Security Protocols
by Cremers, Cas.
Publication:
. XIII, 172 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Brief History of Cryptology and Cryptographic Algorithms
by Dooley, John F.
Publication:
. XII, 99 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Robustness under Large-Scale Attacks
by Zhou, Qing.
Publication:
. VIII, 41 p. 12 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Mining Applications Using Artificial Adaptive Systems
by Tastle, William J.
Publication:
. VII, 275 p. 135 illus., 111 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|