|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XI, 297p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security V
by Shi, Yun Q.
Publication:
. XI, 129p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Services and Applications - Engineering, Control and Management
by Aagesen, Finn Arve.
Publication:
. XIII, 275p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Zhou, Jianying.
Publication:
. XIII, 564p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2010
by Gilbert, Henri.
Publication:
. XIV, 694p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2010
by Nguyen, Phong Q.
Publication:
. XIII, 519p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Sendrier, Nicolas.
Publication:
. X, 241p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|