|
|
Radio Frequency Identification
by Hutter, Michael.
Publication:
. XIV, 177 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Pietro, Roberto.
Publication:
. XIV, 333 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multidisciplinary Research and Practice for Information Systems
by Quirchmayr, Gerald.
Publication:
. XV, 683 p. 235 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|