//]]>
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Canteaut, Anne. Publication: . XII, 463 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2011 by Kim, Howon. Publication: . XII, 512 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Joux, Antoine. Publication: . XI, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية