|
|
Applied algebra : , codes, ciphers, and discrete algorithms /
by Hardy, Darel W.
Publication:
Boca Raton, FL : CRC Press, 2009
. 410 p. :
24 cm. +
Date:2009
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Two-dimensional information theory and coding : , with application to graphics and high-density storage media /
by Justesen, Jorn.
Publication:
Cambridge, UK : Cambridge University Press, 2010
. ix, 171 p. :
26 cm.
Date:2010
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Modem theory : , an introduction to telecommunications /
by Blahut, Richard E.
Publication:
Cambridge, UK : Cambridge University Press, 2010
. xiv, 497 p. :
26 cm.
Date:2010
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Iterative detection : , adaptivity, complexity reduction, and applications /
by Chugg, Keith M.
Publication:
Boston, Mass. : Kluwer Academic Publishers, 2001
. xxvii, 359 p. :
25 cm.
Date:2001
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fading and Shadowing in Wireless Systems
by Shankar, P. Mohana.
Publication:
. XIV, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theory, Combinatorics, and Search Theory
by Aydinian, Harout.
Publication:
. XL, 773 p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Quantum Computation, Communication, and Cryptography
by Iwama, Kazuo.
Publication:
. VIII, 153 p. 7 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – LATINCRYPT 2012
by Hevia, Alejandro.
Publication:
. XII, 323 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Developments in Language Theory
by Yen, Hsu-Chun.
Publication:
. XIII, 478p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2012
by Helleseth, Tor.
Publication:
. XII, 339 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Lin, Dongdai.
Publication:
. XII, 313 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2011
by Preneel, Bart.
Publication:
. XIV, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coding and Cryptology
by Chee, Yeow Meng.
Publication:
. VIII, 295 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 418 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Quantum Computation, Communication, and Cryptography
by Dam, Wim.
Publication:
. VIII, 187 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XI
by Gavrilova, Marina L.
Publication:
. XVIII, 294p.
Availability:
Copies available:
AUM Main Library
(1),
|
|