//]]>
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 546 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Accorsi, Rafael. Publication: . X, 235 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Prouff, Emmanuel. Publication: . X, 215 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Capitani di Vimercati, Sabrina. Publication: . X, 195 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Gaborit, Philippe. Publication: . X, 259 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Deng, Robert H. Publication: . XIV, 388 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية