|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethics and Policy of Biometrics
by Kumar, Ajay.
Publication:
. VIII, 169p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology - CT-RSA 2010
by Pieprzyk, Josef.
Publication:
. 397p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Kant, Krishna.
Publication:
. XIX, 522p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Replication
by Charron-Bost, Bernadette.
Publication:
. XV, 290p. 79 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Wang, Guojun.
Publication:
. XXVI, 480 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2013
by Paul, Goutam.
Publication:
. XVIII, 319 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Bloem, Roderick.
Publication:
. XII, 103 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIV, 414 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Prime Numbers and Computer Methods for Factorization
by Riesel, Hans.
Publication:
. XVIII, 464p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Preserving in Social Networks
by Chbeir, Richard.
Publication:
. XVI, 367 p. 107 illus., 66 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics IX
by Peterson, Gilbert.
Publication:
. XX, 398 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|