//]]>
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2010 by Abe, Masayuki. Publication: . XIV, 634p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Maglio, Paul P. Publication: . XX, 737p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting Dependable Systems VII by Casimiro, Antonio. Publication: . XII, 324p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Languages and Systems by Ueda, Kazunori. Publication: . X, 440p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Daniel, Florian. Publication: . XXVII, 595p. 202 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2010 by Gupta, Indranil. Publication: . XIII, 398p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems, OTM 2010 by Meersman, Robert. Publication: . XXII, 466p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2010 by Meersman, Robert. Publication: . XXII, 703p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Echizen, Isao. Publication: . XIII, 371p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 514p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 472p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XXVII, 534p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Xie, Bing. Publication: . XVII, 328p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification, and Validation by Margaria, Tiziana. Publication: . XV, 498p. 157 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification, and Validation by Margaria, Tiziana. Publication: . XX, 708p. 220 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXI, 498p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart