|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Computer Networks and Distributed Systems Security
by Thampi, Sabu M.
Publication:
. XXI, 508 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Assurance
by Kim, Tai-hoon.
Publication:
. XIV, 406p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVII, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Data Compression
by Salomon, David.
Publication:
. XXII, 1361p. 510 illus., 6 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Security
by Huang, Scott C.-H.
Publication:
. XXIII, 300p. 116 illus., 58 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Signatures
by Katz, Jonathan.
Publication:
. XIV, 183p. 8 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|