//]]>
Information Theoretic Security by Fehr, Serge. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Security Issues in Data Mining and Machine Learning by Dimitrakakis, Christos. Publication: . VII, 141 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Degano, Pierpaolo. Publication: . X, 239 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Ishai, Yuval. Publication: . XII, 631 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2011 by Catalano, Dario. Publication: . XIII, 495p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Research Problems in Network Security by Camenisch, Jan. Publication: . VIII, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Privacy by Camenisch, Jan. Publication: . Approx. 800 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols by Christianson, Bruce. Publication: . VIII, 257p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jha, Somesh. Publication: . XIV, 261p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Aguilera, Marcos K. Publication: . XVII, 420p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2010 by Chen, Lei. Publication: . XV, 641p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Generation Information Technology by Kim, Tai-hoon. Publication: . XVI, 756p. 414 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science X by Gavrilova, Marina L. Publication: . XVIII, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart