005.82 Mar/Iti : Introduction to identity-based encryption / Luther Martin
Introduction to identity-based encryption / Luther Martin
MELB
2008
005.82 Mat/Sai 2004 : Selected areas in cryptography : 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 ; revised papers / Mitsuru Matsui, Robert Zuccherato (eds.)
Selected areas in cryptography : 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 ; revised papers / Mitsuru Matsui, Robert Zuccherato (eds.)
W'PONDS
2004
005.82 Mca/Itc
Introduction to cryptography with open-source software / Alasdair McAndrew
MELB, W'PONDS
2011
Introduction to cryptography with open-source software / Alasdair McAndrew
MELB, W'PONDS
2011
Introduction to cryptography with open-source software / Alasdair McAndrew
MELB, W'PONDS
2011
005.82 Men/Ecp
Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz
MELB, W'PONDS
1993
Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz
MELB, W'PONDS
1993
Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz
MELB, W'PONDS
1993
005.82 Men/Hoa : Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
MELB
1997
005.82 Men/Tic : Topics in cryptology CT-RSA 2005 : the Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. proceedings / [edited by] Alfred Menezes
Topics in cryptology CT-RSA 2005 : the Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. proceedings / [edited by] Alfred Menezes
W'PONDS
2005
005.82 Mol/Ctg : Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin
Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin
W'PONDS
2005
005.82 Mol/Icr 2007 : Innovative cryptography / Nick Moldovyan, Alex Moldovyan
Innovative cryptography / Nick Moldovyan, Alex Moldovyan
MELB
2007
005.82 Mor/Qba
Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers / Oliver Morsch
MELB, W'PONDS
2008
Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers / Oliver Morsch
MELB, W'PONDS
2008
005.82 Moy/Clf : Cryptographic libraries for developers / Ed Moyle and Diana Kelley
Cryptographic libraries for developers / Ed Moyle and Diana Kelley
W'PONDS
2006
005.82 Nar/Woe 2008 : Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others]
Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others]
MELB
2009
005.82 Ned/Eca : Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle
Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle
W'PONDS
2005
005.82 Ned/Ech : Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors)
Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors)
W'PONDS
2004
005.82 Ned/Nti : New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors
New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors
W'PONDS
2006
005.82 Paa/Uca
Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl
MELB, W'PONDS
2010
Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl
MELB, W'PONDS
2010
005.82 Pan/Iho : Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)
Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)
W'PONDS
2009
005.82 Pre/Sai 2005 : Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)
Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)
W'PONDS
2006
005.82 Rao/Iha : The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak
The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak
MELB
2014
005.82 Ros/Iec
Implementing elliptic curve cryptography / Michael Rosing
MELB, W'PONDS
1999
Implementing elliptic curve cryptography / Michael Rosing
MELB, W'PONDS
1999
005.82 Saf/Mha : MRD hashing / R. Safavi-Naini and C. Charnes
MRD hashing / R. Safavi-Naini and C. Charnes
WATERFT ADPML
2005
005.82 Sal/Pkc : Public-key cryptography / Arto Salomaa
Public-key cryptography / Arto Salomaa
W'PONDS
1990
005.82 Sal/Pkc 1996 : Public-key cryptography / Arto Salomaa
Public-key cryptography / Arto Salomaa
W'PONDS
1996
005.82 San/Vsp : VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz
VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz
W'PONDS
1991
005.82 Sch/Acp : Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier
W'PONDS
1994
005.82 Seb/Cai : Cryptography : an introduction / Nigel Smart
Cryptography : an introduction / Nigel Smart
MELB
2003
005.82 Sen/Dhf : Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
W'PONDS
2004
005.82 Shi/Tod : Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)
Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)
MELB
2006
005.82 Sim/Cct : Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons
Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons
W'PONDS
1992
005.82 Sta/Can 2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
005.82 Sta/Icw
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
005.82 Sti/Cta 2006
Cryptography : theory and practice / Douglas R. Stinson
MELB, W'PONDS
2006
Cryptography : theory and practice / Douglas R. Stinson
MELB, W'PONDS
2006
005.82 Tra/Itc 2006
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
3 additional entries
005.82 Tuy/Swn : Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar
W'PONDS
2007
005.82 Vie/Nsw : Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra
Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra
MELB
2002
005.82 Yan/Cao : Cryptanalytic attacks on RSA / Song Y. Yan
Cryptanalytic attacks on RSA / Song Y. Yan
W'PONDS
2007
005.82 Yan/Pta 2009
Primality testing and integer factorization in public-key cryptography / by Song Y. Yan
MELB, W'PONDS
2009
Primality testing and integer factorization in public-key cryptography / by Song Y. Yan
MELB, W'PONDS
2009
005.82 You/Mce : Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung
Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung
W'PONDS
2004
005.82 Zon/Rdi : Robust digital image watermarking / by Tianrui Zong
Robust digital image watermarking / by Tianrui Zong
MELB THESES
2015
005.8201512 Kob/Aao : Algebraic aspects of cryptography / Neal Koblitz
Algebraic aspects of cryptography / Neal Koblitz
MELB
1998
005.824 Dor/Bfc : Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak
Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak
MELB
2020
005.84 Ala/Aos : Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab
Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab
MELB THESES
2014
005.84 Erb/Twa : Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe
MELB
2005
005.84 Fil/Cuf : Computer viruses : from theory to applications / Eric Filiol
Computer viruses : from theory to applications / Eric Filiol
MELB
2005
005.84 Gri/Mmc : Malicious mobile code : virus protection for Windows / Roger A. Grimes
Malicious mobile code : virus protection for Windows / Roger A. Grimes
W'PONDS
2001
005.84 Mon/Lma : Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A
MELB
2018
005.84 Par/Dca : Digital contagions : a media archaeology of computer viruses / Jussi Parikka
Digital contagions : a media archaeology of computer viruses / Jussi Parikka
WATERFT
2007
005.84 Par/Dca 2016 : Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka
Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka
MELB
2016
005.84 Sik/Pma : Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig
MELB
c2012
005.84 Sin/Imc : Identifying malicious code through reverse engineering / edited by Abhishek Singh
Identifying malicious code through reverse engineering / edited by Abhishek Singh
MELB
2009
005.84 Xia/Soa : A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury
A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury
WATERFT ADPML
2004
Add Marked to Bag
Add All On Page
Add Marked to My Lists