|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Gaborit, Philippe.
Publication:
. X, 259 p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2013
by Johansson, Thomas.
Publication:
. XIV, 736 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Deng, Robert H.
Publication:
. XIV, 388 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Jøsang, Audun.
Publication:
. X, 321 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology – ICISC 2012
by Kwon, Taekyoung.
Publication:
. XIV, 512 p. 108 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Sahai, Amit.
Publication:
. XII, 726 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Kirchner, Matthias.
Publication:
. X, 285 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|