|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2011
by Lee, Dong Hoon.
Publication:
. XIV, 760 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
RFID. Security and Privacy
by Juels, Ari.
Publication:
. X, 260p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Intelligent Information Systems
by Bouvry, Pascal.
Publication:
. XVII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Iwata, Tetsu.
Publication:
. XII, 231 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Aspects in Information Technology
by Joye, Marc.
Publication:
. XIV, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Boyen, Xavier.
Publication:
. XIII, 399 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Filler, Tomáš.
Publication:
. XII, 343p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2011
by Atluri, Vijay.
Publication:
. XIV, 686p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Sacchi, Claudio.
Publication:
. XIII, 255 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Sommer, Robin.
Publication:
. 398p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 170p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIV, 498p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Calero, Jose M. Alcaraz.
Publication:
. XII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
by Tjoa, A Min.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations of Security Analysis and Design VI
by Aldini, Alessandro.
Publication:
. VII, 275p.
Availability:
Copies available:
AUM Main Library
(1),
|
|