|
|
Advances in Cryptology – EUROCRYPT 2013
by Johansson, Thomas.
Publication:
. XIV, 736 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Deng, Robert H.
Publication:
. XIV, 388 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Jøsang, Audun.
Publication:
. X, 321 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology – ICISC 2012
by Kwon, Taekyoung.
Publication:
. XIV, 512 p. 108 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Sahai, Amit.
Publication:
. XII, 726 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Kirchner, Matthias.
Publication:
. X, 285 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Knudsen, Lars R.
Publication:
. XIV, 407 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Pietro, Roberto.
Publication:
. XIV, 333 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XX
by Christianson, Bruce.
Publication:
. X, 277 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Lee, Dong Hoon.
Publication:
. XII, 371 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|