|
|
Provable Security
by Takagi, Tsuyoshi.
Publication:
. XIII, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Keromytis, Angelos D.
Publication:
. XI, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multidisciplinary Research and Practice for Information Systems
by Quirchmayr, Gerald.
Publication:
. XV, 683 p. 235 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermarking
by Shi, Yun Qing.
Publication:
. X, 512 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VIII
by Shi, Yun Q.
Publication:
. IX, 103 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Özbudak, Ferruh.
Publication:
. XII, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|