|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Katzenbeisser, Stefan.
Publication:
. XII, 341p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2012
by Helleseth, Tor.
Publication:
. XII, 339 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Bruni, Roberto.
Publication:
. X, 243p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2012
by Fischlin, Marc.
Publication:
. XIV, 734 p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXI, 421 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXII, 437 p. 191 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Petkova-Nikova, Svetla.
Publication:
. X, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Laud, Peeter.
Publication:
. X, 273 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Barthe, Gilles.
Publication:
. X, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Ryan, Mark D.
Publication:
. XIII, 406p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection
by Lopez, Javier.
Publication:
. XIV, 357 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneus Security
by Garcia-Alfaro, Joaquin.
Publication:
. XV, 319 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|