//]]>
Advances in Cryptology – CRYPTO 2013 by Canetti, Ran. Publication: . XVIII, 558 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2013 by Canetti, Ran. Publication: . XVIII, 590 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Prouff, Emmanuel. Publication: . X, 215 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Capitani di Vimercati, Sabrina. Publication: . X, 195 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Gaborit, Philippe. Publication: . X, 259 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Kutyłowski, Mirosław. Publication: . XII, 393 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2013 by Johansson, Thomas. Publication: . XIV, 736 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Deng, Robert H. Publication: . XIV, 388 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology – ICISC 2012 by Kwon, Taekyoung. Publication: . XIV, 512 p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية