//]]>
Fast Software Encryption by Canteaut, Anne. Publication: . XII, 463 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Network Security by Kotenko, Igor. Publication: . XIV, 319 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XII, 365 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2012 by Hevia, Alejandro. Publication: . XII, 323 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Gollmann, Dieter. Publication: . XIV, 402 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Takagi, Tsuyoshi. Publication: . XIII, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Keromytis, Angelos D. Publication: . XI, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Visconti, Ivan. Publication: . XI, 582 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 177 p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identity by Kiayias, Aggelos. Publication: . X, 257 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Research and Practice for Information Systems by Quirchmayr, Gerald. Publication: . XV, 683 p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XII, 351 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VIII by Shi, Yun Q. Publication: . IX, 103 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart