|
|
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /
Publication:
Berlin : Springer, 2010
. x, 240 p. :
Date:2010
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Chaos-Based Cryptography
by Kocarev, Ljupco.
Publication:
. X, 390p. 161 illus., 67 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Securing Wireless Communications at the Physical Layer
by Liu, Ruoheng.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XII, 365 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermarking
by Shi, Yun Qing.
Publication:
. X, 512 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Özbudak, Ferruh.
Publication:
. XII, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Laud, Peeter.
Publication:
. X, 273 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Barthe, Gilles.
Publication:
. XII, 151p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Aura, Tuomas.
Publication:
. X, 289 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|