//]]>
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XI by Gavrilova, Marina L. Publication: . XVIII, 294p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Heng, Swee-Huay. Publication: . XIII, 355p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2010 by Abe, Masayuki. Publication: . XIV, 634p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Hasan, M. Anwar. Publication: . 280p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Identity-Based Encryption by Chatterjee, Sanjit. Publication: . XI, 182p. 19 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart