//]]>
Locally Decodable Codes and Private Information Retrieval Schemes by Yekhanin, Sergey. Publication: . XII, 82 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Secure Two-Party Protocols by Hazay, Carmit. Publication: . XIII, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer and Computing Technologies in Agriculture III by Li, Daoliang. Publication: . XV, 561p. 246 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XVI, 915p. 450 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations by Wu, Yanwen. Publication: . Approx. 110 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding Cryptography by Paar, Christof. Publication: . XVIII, 372p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The LLL Algorithm by Nguyen, Phong Q. Publication: . XIV, 496 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Signcryption by Dent, Alexander W. Publication: . XVIII, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Operational Semantics and Verification of Security Protocols by Cremers, Cas. Publication: . XIII, 172 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Brief History of Cryptology and Cryptographic Algorithms by Dooley, John F. Publication: . XII, 99 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Robustness under Large-Scale Attacks by Zhou, Qing. Publication: . VIII, 41 p. 12 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Mining Applications Using Artificial Adaptive Systems by Tastle, William J. Publication: . VII, 275 p. 135 illus., 111 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart