|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 418 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Watermarking
by Kim, Hyoung-Joong.
Publication:
. X, 317p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Quantum Computation, Communication, and Cryptography
by Dam, Wim.
Publication:
. VIII, 187 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XI
by Gavrilova, Marina L.
Publication:
. XVIII, 294p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Procedural Semantics for Hyperintensional Logic
by Duží, Marie.
Publication:
. XIII, 550p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Unsolved Problems in Coding Theory
by Joyner, David.
Publication:
. XII, 248p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards an Information Theory of Complex Networks
by Dehmer, Matthias.
Publication:
. XVI, 395p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Game Start!
by Alinovi, Francesco.
Publication:
. VII, 296 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Thinkquest~2010
by Pise, S. J.
Publication:
. IX, 327p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Flow Based Security Control Beyond RBAC
by Fischer-Hellmann, Klaus-Peter.
Publication:
. XXI, 161 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolution of Semantic Systems
by Küppers, Bernd-Olaf.
Publication:
. XII, 232 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|