|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Bao, Feng.
Publication:
. XIII, 448p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coding and Cryptology
by Chee, Yeow Meng.
Publication:
. VIII, 295 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXII, 381 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXI, 473 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2011
by Paterson, Kenneth G.
Publication:
. XIV, 628p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Biryukov, Alex.
Publication:
. XIII, 411 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Ishai, Yuval.
Publication:
. XII, 631 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2011
by Catalano, Dario.
Publication:
. XIII, 495p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Research Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 171 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2011
by Kiayias, Aggelos.
Publication:
. XIII, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|