|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXI, 473 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2011
by Paterson, Kenneth G.
Publication:
. XIV, 628p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Biryukov, Alex.
Publication:
. XIII, 411 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2011
by Catalano, Dario.
Publication:
. XIII, 495p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Research Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 171 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Privacy
by Camenisch, Jan.
Publication:
. Approx. 800 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Burmester, Mike.
Publication:
. XIV, 446p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Chung, Yongwha.
Publication:
. XIII, 352p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols
by Christianson, Bruce.
Publication:
. VIII, 257p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Jha, Somesh.
Publication:
. XIV, 261p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science X
by Gavrilova, Marina L.
Publication:
. XVIII, 366p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2010
by Abe, Masayuki.
Publication:
. XIV, 634p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Xie, Bing.
Publication:
. XVII, 328p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|