|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Theoretic Concepts in Computer Science
by Thilikos, Dimitrios M.
Publication:
. XIII, 338p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVII, 245p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVIII, 587p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Serna, Maria.
Publication:
. XIII, 782p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIII, 754p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIV, 614p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Thai, My T.
Publication:
. 553p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learning and Intelligent Optimization
by Blum, Christian.
Publication:
. XIV, 344p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Hasan, M. Anwar.
Publication:
. 280p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Zhou, Jianying.
Publication:
. XIII, 564p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structural Information and Communication Complexity
by Patt-Shamir, Boaz.
Publication:
. 273p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2010
by Gilbert, Henri.
Publication:
. XIV, 694p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fun with Algorithms
by Boldi, Paolo.
Publication:
. IX, 382p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Complexity
by Calamoneri, Tiziana.
Publication:
. XI, 384p.
Availability:
Copies available:
AUM Main Library
(1),
|
|