|
|
Advanced statistical steganalysis/
by Bohme, Rainer,
Publication:
Heidelberg : Springer-Verlag, 2010
. 285 p.
Date:2010
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fault Analysis in Cryptography
by Joye, Marc.
Publication:
. XVI, 354 p. 98 illus., 35 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Block Cipher Companion
by Knudsen, Lars R.
Publication:
. XIV, 270 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Hardware-Intrinsic Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Locally Decodable Codes and Private Information Retrieval Schemes
by Yekhanin, Sergey.
Publication:
. XII, 82 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Statistical Steganalysis
by Böhme, Rainer.
Publication:
. XVI, 288 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Efficient Secure Two-Party Protocols
by Hazay, Carmit.
Publication:
. XIII, 263 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The LLL Algorithm
by Nguyen, Phong Q.
Publication:
. XIV, 496 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Practical Signcryption
by Dent, Alexander W.
Publication:
. XVIII, 274 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Operational Semantics and Verification of Security Protocols
by Cremers, Cas.
Publication:
. XIII, 172 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|