Your search returned 11 results.

1.
Embedded Cryptographic Hardware: design & security by Nadia Nedjah

by Nedjah, Nadia | Macedo Mourelle, Luiza de.

Material type: Text Text Publication details: New York Nova Science Publishers 2005Availability: Items available for reference: Not for loanCall number: REF 005.82 NED (1). :

2.
Introduction to Computer and Network Security: navigating shades of gray Richard R. Brooks

by Brooks, Richard R.

Material type: Text Text Publication details: Boca Raton CRC Press 2018Availability: Items available for loan: Call number: 005.8 BRO (1).

3.
New Directions of Modern Cryptography by Zhenfu Cao

by Cao, Zhenfu.

Material type: Text Text Publication details: Boca Raton CRC Press 2013Availability: Items available for reference: Not for loanCall number: REF 005.8 CAO (1). :

4.
Computational Number Theory and Modern Cryptography by Song Y. Yan

by Yan, Song Y.

Material type: Text Text Publication details: Singapore John Wiley & Sons 2013Availability: Items available for reference: Not for loanCall number: REF 005.82 YAN (1). :

5.
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi

by Gupta, Brij | Yamaguchi, Shingo | Agrawal, Dharma P.

Material type: Text Text Publication details: IGI Global 2016Availability: Items available for reference: Not for loanCall number: REF 005.82 GUP (1). :

6.
Identity-Based Encryption Sanjit Chatterjee

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2011Availability: Items available for reference: Not for loanCall number: REF 005.82 CHA (1). :

7.
Practical Signcryption Alexander W. Dent

by Dent, Alexander W | Zheng, Yuliang.

Material type: Text Text Publication details: New York Springer 2010Availability: Items available for reference: Not for loanCall number: REF 005.82 DEN (1). :

8.
Multivariate Public Key Cryptosystems Jintai Ding

by Ding, Jintai | Schmidt, Dieter S | Gower, Jason E.

Material type: Text Text Publication details: U S A Springer 2006Availability: Items available for reference: Not for loanCall number: REF 005.82 DIN (1). :

9.
Introduction to Cryptography with Mathematical Foundations and Computer Implementations Alexander Stanoyevitch.

by Stanoyevitch, Alexander.

Material type: Text Text Publication details: Boca Raton Chapman and Hall 2011Availability: Items available for reference: Not for loanCall number: REF 005.8 STA (1). :

10.
Introduction to Cryptography with Open-Source Software Alasdair McAndrew.

by McAndrew, Alasdair.

Material type: Text Text Publication details: Boca Raton, FL CRC Press 2011Availability: Items available for reference: Not for loanCall number: REF 005.82 MCA (1). :

11.
Image Encryption; a communication perspective Fathi E. Abd El Samie...[et. al.]

by Samie, Fathi E. Abd El | Alshebeili, Saleh A | Rabaie, El-Sayed M | Faragallah, Osama S | Shahieen, Mai H | Elashry, Ibrahim F | Ahmed, Hossam Eldin H.

Material type: Text Text Publication details: Boca Raton CRC Press 2017Availability: Items available for loan: Call number: 006.6 ELS (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha