FEEDBACK

Your search returned 949 results. Subscribe to this search

|
1. Internet cryptography

by Smith, Richard E 1952-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson Education, c2000Availability: Items available for loan: IIITD [005.82 SMI-I] (1).

2. The code book : the secret history of codes and code breaking

by Singh, Simon.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Doubleday, c1999Online access: Contributor biographical information | Sample text | Publisher description Availability: Items available for loan: IIITD [005.82 SIN-C] (1).
  (2 votes)
3. Multimedia forensics and security

by Li, Chang-Tsun.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey : Information Science Reference, c2009Online access: Table of contents only Availability: Items available for loan: IIITD [REF 005.8 LI-M] (1).

4. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof 1963- | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Springer, c2010Availability: Items available for loan: IIITD [005.82 PAA-U] (1).

5. Cryptology : classical and modern with maplets

by Klima, Richard E | Sigmon, Neil.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: IIITD [REF 005.82 KLI-C] (1).

6. Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting

by Cole, Peter H | Ranasinghe, Damith C.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin : Springer, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [REF 621.384 COL-N] (1).

7. Computational number theory and modern cryptography

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: not fiction Online access: Cover image Availability: Items available for loan: IIITD [REF 005.82 YAN-C] (1).

8. Algebraic curves in cryptography

by Ling, San 1964- | Wang, Huaxiong | Xing, Chaoping 1963-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : CRC, c2013Availability: Items available for loan: IIITD [REF 516.352 LIN-A] (1).

9. Computational number theory

by Das, Abhijit 1968-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London.: Taylor and Francis, c2013Online access: Cover image Availability:
Items available for reference: IIITD [CBIA 512.7028 DAS-C] (1).

10. Secure multi-party computation

by Prabhakaran, Manoj M.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Netherlands : IOS Press, ©2013Availability: Items available for loan: IIITD [REF 005.82 PRA-S] (1).

11. Implementing SSL/TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2011Other title: Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure.Availability: No items available
Checked out (1).

12. Everyday cryptography : fundamental principles and applications

by Martin, Keith M.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Oxford University Press, ©2012Availability:
Items available for reference: IIITD [REF 005.82 MAR-E] (1).

13. Network security and cryptography

by Menezes, Bernard.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Delhi : Cengage Learning, ©2010Availability:
Items available for reference: IIITD [CBIA 005.8 MEN-N] (1).

14. The code book : the science of secrecy from ancient Egypt to quantum cryptography

by Singh, Simon.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Random House, ©1999Availability: No items available
Checked out (1).

15. Security Protocols [electronic resource] :International Workshop Cambridge, United Kingdom, April 10–12, 1996 Proceedings /

by Lomas, Mark [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1997.Online access: Click here to access online Availability: No items available

16. Information Security and Privacy [electronic resource] :Second Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings /

by Varadharajan, Vijay [editor.] | Pieprzyk, Josef [editor.] | Mu, Yi [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1997.Online access: Click here to access online Availability: No items available

17. Fast Software Encryption [electronic resource] :4th International Workshop, FSE’97 Haifa, Israel, January 20–22 1997 Proceedings /

by Biham, Eli [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1997.Online access: Click here to access online Availability: No items available

18. Advances in Cryptology — CRYPTO '97 [electronic resource] :17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings /

by Kaliski, Burton S [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1997.Online access: Click here to access online Availability: No items available

19. Financial Cryptography [electronic resource] :First International Conference, FC '97 Anguilla, British West Indies February 24–28, 1997 Proceedings /

by Hirschfeld, Rafael [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1997.Online access: Click here to access online Availability: No items available

20. Information and Communications Security [electronic resource] :First International Conference, ICIS '97 Beijing, China, November 11–14, 1997 Proceedings /

by Han, Yongfei [editor.] | Okamoto, Tatsuaki [editor.] | Qing, Sihan [editor.] | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1997.Online access: Click here to access online Availability: No items available


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in