|
|
Public Key Cryptography – PKC 2012
by Fischlin, Marc.
Publication:
. XIV, 734 p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXI, 421 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXII, 437 p. 191 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012 Workshops
by Becvar, Zdenek.
Publication:
. XVI, 158p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Petkova-Nikova, Svetla.
Publication:
. X, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Euro-Par 2011: Parallel Processing Workshops
by Alexander, Michael.
Publication:
. XXX, 480 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Euro-Par 2011: Parallel Processing Workshops
by Alexander, Michael.
Publication:
. XXIX, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Reversible Computation
by Vos, Alexis.
Publication:
. IX, 123p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
LATIN 2012: Theoretical Informatics
by Fernández-Baca, David.
Publication:
. XVII, 669 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Computing, Networking and Security
by Thilagam, P. Santhi.
Publication:
. XVII, 641 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Petri Nets and Other Models of Concurrency V
by Jensen, Kurt.
Publication:
. XVII, 293 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VII
by Shi, Yun Q.
Publication:
. IX, 115p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Compiler Construction
by O’Boyle, Michael.
Publication:
. XVI, 245 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XV
by Gavrilova, Marina L.
Publication:
. XIII, 217 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive and Learning Agents
by Vrancx, Peter.
Publication:
. VII, 135 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|