|
|
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /
Publication:
Berlin : Springer, 2010
. x, 240 p. :
Date:2010
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Bagchi, Aditya.
Publication:
. XVI, 404 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2013
by Sako, Kazue.
Publication:
. XXIV, 542 p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2013
by Sako, Kazue.
Publication:
. XXIV, 546 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Number Theory and Cryptography
by Fischlin, Marc.
Publication:
. XII, 281 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XXI
by Christianson, Bruce.
Publication:
. X, 267 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Riis Nielson, Hanne.
Publication:
. XIV, 321 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructure Security
by Bologna, Sandro.
Publication:
. XII, 227 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Sakiyama, Kazuo.
Publication:
. XII, 319 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification
by Hutter, Michael.
Publication:
. XIV, 177 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Gierlichs, Benedikt.
Publication:
. XIV, 191 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Palamidessi, Catuscia.
Publication:
. X, 213 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Accorsi, Rafael.
Publication:
. X, 235 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Engineering and Intelligence Informatics
by Cuzzocrea, Alfredo.
Publication:
. XIV, 466 p. 122 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Lightweight Cryptography for Security and Privacy
by Avoine, Gildas.
Publication:
. X, 143 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|