//]]>
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Kutyłowski, Mirosław. Publication: . XII, 393 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory, Combinatorics, and Search Theory by Aydinian, Harout. Publication: . XL, 773 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2012 by Hevia, Alejandro. Publication: . XII, 323 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VIII by Shi, Yun Q. Publication: . IX, 103 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Yen, Hsu-Chun. Publication: . XIII, 478p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 Next >>

Languages: 
English |
العربية