|
|
Fun with Algorithms
by Kranakis, Evangelos.
Publication:
. XI, 397p. 148 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2012
by Fischlin, Marc.
Publication:
. XIV, 734 p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
LATIN 2012: Theoretical Informatics
by Fernández-Baca, David.
Publication:
. XVII, 669 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XV
by Gavrilova, Marina L.
Publication:
. XIII, 217 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVII, 339p. 155 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVIII, 477p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2012
by Dunkelman, Orr.
Publication:
. XI, 434p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SOFSEM 2012: Theory and Practice of Computer Science
by Bieliková, Mária.
Publication:
. XVII, 674 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Distributed Systems
by Fernàndez Anta, Antonio.
Publication:
. XIII, 564 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph-Theoretic Concepts in Computer Science
by Kolman, Petr.
Publication:
. XI, 344 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Asano, Takao.
Publication:
. XVIII, 775 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learning and Intelligent Optimization
by Coello, Carlos A. Coello.
Publication:
. XVII, 636 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Lin, Dongdai.
Publication:
. XII, 313 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Chen, Ning.
Publication:
. XII, 420 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|