|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Palamidessi, Catuscia.
Publication:
. X, 213 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theory, Combinatorics, and Search Theory
by Aydinian, Harout.
Publication:
. XL, 773 p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Quantum Computation, Communication, and Cryptography
by Iwama, Kazuo.
Publication:
. VIII, 153 p. 7 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2012
by Helleseth, Tor.
Publication:
. XII, 339 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Bruni, Roberto.
Publication:
. X, 243p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIII, 432p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2011
by Preneel, Bart.
Publication:
. XIV, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Ishai, Yuval.
Publication:
. XII, 631 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 418 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Quantum Computation, Communication, and Cryptography
by Dam, Wim.
Publication:
. VIII, 187 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XI
by Gavrilova, Marina L.
Publication:
. XVIII, 294p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|