|
|
Chaos-Based Cryptography
by Kocarev, Ljupco.
Publication:
. X, 390p. 161 illus., 67 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Securing Wireless Communications at the Physical Layer
by Liu, Ruoheng.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Palamidessi, Catuscia.
Publication:
. X, 213 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermaking
by Shi, Yun Q.
Publication:
. XX, 532 p. 245 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XII, 365 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – LATINCRYPT 2012
by Hevia, Alejandro.
Publication:
. XII, 323 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|