//]]>
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Joux, Antoine. Publication: . XI, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by McCune, Jonathan M. Publication: . VII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence in Security for Information Systems by Herrero, Álvaro. Publication: . XIV, 310p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Atallah, Mikhail. Publication: . XIII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication by Ardagna, Claudio A. Publication: . XIII, 392 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXII, 381 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXI, 473 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Fehr, Serge. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2011 by Catalano, Dario. Publication: . XIII, 495p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Spring, Neil. Publication: . XI, 246 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols by Christianson, Bruce. Publication: . VIII, 257p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science X by Gavrilova, Marina L. Publication: . XVIII, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2010 by Abe, Masayuki. Publication: . XIV, 634p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية