|
|
The Block Cipher Companion
by Knudsen, Lars R.
Publication:
. XIV, 270 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Leeuw, Elisabeth.
Publication:
. X, 145p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection IV
by Moore, Tyler.
Publication:
. XVIII, 260p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Power Electronics and Instrumentation Engineering
by Das, Vinu V.
Publication:
. X, 114p. 95 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Hardware-Intrinsic Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Locally Decodable Codes and Private Information Retrieval Schemes
by Yekhanin, Sergey.
Publication:
. XII, 82 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Efficient Secure Two-Party Protocols
by Hazay, Carmit.
Publication:
. XIII, 263 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
VLSI-SoC: Design Methodologies for SoC and SiP
by Piguet, Christian.
Publication:
. VIII, 287p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer and Computing Technologies in Agriculture III
by Li, Daoliang.
Publication:
. XV, 561p. 246 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XVI, 915p. 450 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations
by Wu, Yanwen.
Publication:
. Approx. 110 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Digital Forensics
by Weerasinghe, Dasun.
Publication:
. 196p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding Cryptography
by Paar, Christof.
Publication:
. XVIII, 372p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The LLL Algorithm
by Nguyen, Phong Q.
Publication:
. XIV, 496 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Practical Signcryption
by Dent, Alexander W.
Publication:
. XVIII, 274 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Operational Semantics and Verification of Security Protocols
by Cremers, Cas.
Publication:
. XIII, 172 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Brief History of Cryptology and Cryptographic Algorithms
by Dooley, John F.
Publication:
. XII, 99 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|