|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Building a National Distributed e-Infrastructure–PL-Grid
by Bubak, Marian.
Publication:
. XII, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2012
by Dunkelman, Orr.
Publication:
. XI, 434p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIII, 253 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Jung, Souhwan.
Publication:
. XII, 271p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Bononi, Luciano.
Publication:
. XIV, 550p. 196 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XIX
by Christianson, Bruce.
Publication:
. IX, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2011
by Lee, Dong Hoon.
Publication:
. XIV, 760 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
RFID. Security and Privacy
by Juels, Ari.
Publication:
. X, 260p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIII, 432p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Iwata, Tetsu.
Publication:
. XII, 231 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2011
by Meersman, Robert.
Publication:
. XXVIII, 430 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|