|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XV
by Gavrilova, Marina L.
Publication:
. XIII, 217 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVII, 339p. 155 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVIII, 477p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2012
by Dunkelman, Orr.
Publication:
. XI, 434p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SOFSEM 2012: Theory and Practice of Computer Science
by Bieliková, Mária.
Publication:
. XVII, 674 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Distributed Systems
by Fernàndez Anta, Antonio.
Publication:
. XIII, 564 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph-Theoretic Concepts in Computer Science
by Kolman, Petr.
Publication:
. XI, 344 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Asano, Takao.
Publication:
. XVIII, 775 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learning and Intelligent Optimization
by Coello, Carlos A. Coello.
Publication:
. XVII, 636 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Lin, Dongdai.
Publication:
. XII, 313 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Chen, Ning.
Publication:
. XII, 420 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2011
by Demetrescu, Camil.
Publication:
. XIX, 813 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Goldberg, Leslie Ann.
Publication:
. XV, 702 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|