Your search returned 13 results.

Sort
Results
1.
Cryptography and network security by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chennai : McGraw Hill, ©2023
Availability: Items available for loan: IIITD (1)Call number: CBIA 005.82 KAH-C.

2.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (5)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (2).

3.
The code book : the science of secrecy from ancient Egypt to quantum cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Random House, ©1999
Availability: Items available for loan: IIITD (1)Call number: CB 652.8 SIN-C. Not available: IIITD: Checked out (1).

4.
Network security and cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Cengage Learning, ©2010
Availability: Not available: IIITD: Loan on demand (1).

5.
Everyday cryptography : fundamental principles and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 MAR-E.

6.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

7.
Secure multi-party computation by Series: Cryptology and information security series ; v. 10
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Netherlands : IOS Press, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 PRA-S.

8.
Computational number theory by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London.: Taylor and Francis, ©2013
Online access:
Availability: Not available: IIITD: Loan on demand (1).

9.
Algebraic curves in cryptography by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CRC, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 516.352 LIN-A.

10.
Computational number theory and modern cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Online access:
Availability: Not available: IIITD: Checked out (1).

11.
Cryptology : classical and modern with maplets by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 KLI-C.

12.
Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin : Springer, ©2008
Availability: Items available for loan: IIITD (1)Call number: REF 621.384 COL-N.

13.
Multimedia forensics and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey : Information Science Reference, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LI-M.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in