|
61.
|
|
|
62.
|
|
|
63.
|
Computer security Dieter Gollmann by Gollman, Dieter. Edition: 2nd ed.Material type: Text Publication details: Singapore John Wiley & Sons 2006Availability: Items available for loan: Call number: 005.8 GOL (3).
|
|
64.
|
|
|
65.
|
Computer Security Basics Rick Lehtinen by Lehtinen, Rick | Sr., G. T. Gangemi | Russell, Deborah. Edition: 2nd ed.Material type: Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 LEH (7).
|
|
66.
|
|
|
67.
|
|
|
68.
|
|
|
69.
|
|
|
70.
|
|
|
71.
|
|
|
72.
|
|
|
73.
|
|
|
74.
|
Role Based Access Control David F. Ferraiolo by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn Richard D. Edition: 2nd ed.Material type: Text Publication details: Bostan Artech House 2007Availability: Items available for reference: Not for loanCall number: REF 005.8 FER (1). :
|
|
75.
|
|
|
76.
|
|
|
77.
|
|
|
78.
|
|
|
79.
|
Identity-Based Encryption Sanjit Chatterjee by Chatterjee, Sanjit | Sarkar, Palash. Material type: Text Publication details: New York Springer Verlag, Netherlands 2011Availability: Items available for reference: Not for loanCall number: REF 005.82 CHA (1). :
|
|
80.
|
Multivariate Public Key Cryptosystems Jintai Ding by Ding, Jintai | Schmidt, Dieter S | Gower, Jason E. Material type: Text Publication details: U S A Springer 2006Availability: Items available for reference: Not for loanCall number: REF 005.82 DIN (1). :
|