|
|
Multiagent System Technologies
by Klusch, Matthias.
Publication:
. XII, 426 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Engineering and Intelligence Informatics
by Cuzzocrea, Alfredo.
Publication:
. XIV, 466 p. 122 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Communication Networking
by Bauschert, Thomas.
Publication:
. XII, 322 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Lightweight Cryptography for Security and Privacy
by Avoine, Gildas.
Publication:
. X, 143 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems - CHES 2013
by Bertoni, Guido.
Publication:
. XIV, 490 p. 172 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermaking
by Shi, Yun Q.
Publication:
. XX, 532 p. 245 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2013
by Canetti, Ran.
Publication:
. XVIII, 558 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2013
by Canetti, Ran.
Publication:
. XVIII, 590 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Aided Verification
by Sharygina, Natasha.
Publication:
. XXII, 1015 p. 237 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Wang, G. Alan.
Publication:
. X, 117 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 679 p. 276 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 729 p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interactive Theorem Proving
by Blazy, Sandrine.
Publication:
. XII, 498 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computing Theories and Technology
by Huang, De-Shuang.
Publication:
. XXIV, 693 p. 268 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|