//]]>
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Katzenbeisser, Stefan. Publication: . XII, 341p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Bruni, Roberto. Publication: . X, 243p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXII, 437 p. 191 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Laud, Peeter. Publication: . X, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Barthe, Gilles. Publication: . X, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Ryan, Mark D. Publication: . XIII, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneus Security by Garcia-Alfaro, Joaquin. Publication: . XV, 319 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart