//]]>
Applied algebra : , codes, ciphers, and discrete algorithms / by Hardy, Darel W. Publication: Boca Raton, FL : CRC Press, 2009 . 410 p. : 24 cm. + Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Two-dimensional information theory and coding : , with application to graphics and high-density storage media / by Justesen, Jorn. Publication: Cambridge, UK : Cambridge University Press, 2010 . ix, 171 p. : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Modem theory : , an introduction to telecommunications / by Blahut, Richard E. Publication: Cambridge, UK : Cambridge University Press, 2010 . xiv, 497 p. : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Iterative detection : , adaptivity, complexity reduction, and applications / by Chugg, Keith M. Publication: Boston, Mass. : Kluwer Academic Publishers, 2001 . xxvii, 359 p. : 25 cm. Date:2001 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fading and Shadowing in Wireless Systems by Shankar, P. Mohana. Publication: . XIV, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory, Combinatorics, and Search Theory by Aydinian, Harout. Publication: . XL, 773 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2012 by Hevia, Alejandro. Publication: . XII, 323 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Yen, Hsu-Chun. Publication: . XIII, 478p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Chen, Liqun. Publication: . XIII, 497 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Lin, Dongdai. Publication: . XII, 313 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2011 by Preneel, Bart. Publication: . XIV, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coding and Cryptology by Chee, Yeow Meng. Publication: . VIII, 295 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Iliopoulos, Costas S. Publication: . XI, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Dam, Wim. Publication: . VIII, 187 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XI by Gavrilova, Marina L. Publication: . XVIII, 294p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart