Your search returned 5 results.

Sort
Results
1.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Not available: IIITD: Checked out (1).
  (1 votes)
2.
Practical cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, ©2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 FER-P.

3.
Liars and outliers : enabling the trust that society needs to thrive by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 302.14 SCH-L.

4.
Fast Software Encryption [electronic resource] : 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings / by Series: Lecture Notes in Computer Science ; 1978
Edition: 1st ed. 2001.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001 In: Springer Nature eBook
Availability: No items available.

5.
Smart Card. Research and Applications [electronic resource] : Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings / by Series: Lecture Notes in Computer Science ; 1820
Edition: 1st ed. 2000.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000 In: Springer Nature eBook
Availability: No items available.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in