//]]>
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects in Security and Trust by Degano, Pierpaolo. Publication: . X, 279p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Kant, Krishna. Publication: . XIX, 522p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Replication by Charron-Bost, Bernadette. Publication: . XV, 290p. 79 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Wang, Guojun. Publication: . XXVI, 480 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2013 by Paul, Goutam. Publication: . XVIII, 319 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Bloem, Roderick. Publication: . XII, 103 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIV, 414 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Prime Numbers and Computer Methods for Factorization by Riesel, Hans. Publication: . XVIII, 464p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Preserving in Social Networks by Chbeir, Richard. Publication: . XVI, 367 p. 107 illus., 66 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics IX by Peterson, Gilbert. Publication: . XX, 398 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart