Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.82 Mar/Iti : Introduction to identity-based encryption / Luther Martin     
      Introduction to identity-based encryption / Luther Martin MELB  Book 2008
005.82 Mat/Sai 2004 : Selected areas in cryptography : 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 ; revised papers / Mitsuru Matsui, Robert Zuccherato (eds.)     
      Selected areas in cryptography : 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 ; revised papers / Mitsuru Matsui, Robert Zuccherato (eds.) W'PONDS  Book 2004
005.82 Mca/Itc    
      Introduction to cryptography with open-source software / Alasdair McAndrew MELB, W'PONDS   Book 2011
      Introduction to cryptography with open-source software / Alasdair McAndrew MELB, W'PONDS   Book 2011
      Introduction to cryptography with open-source software / Alasdair McAndrew MELB, W'PONDS   Book 2011
005.82 Men/Ecp    
      Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz MELB, W'PONDS   Book 1993
      Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz MELB, W'PONDS   Book 1993
      Elliptic curve public key cryptosystems / by Alfred Menezes ; foreword by Neal Koblitz MELB, W'PONDS   Book 1993
005.82 Men/Hoa : Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone     
      Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone MELB  Book 1997
005.82 Men/Tic : Topics in cryptology CT-RSA 2005 : the Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. proceedings / [edited by] Alfred Menezes     
      Topics in cryptology CT-RSA 2005 : the Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. proceedings / [edited by] Alfred Menezes W'PONDS  Book 2005
005.82 Mol/Ctg : Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin     
      Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin W'PONDS  Book 2005
005.82 Mol/Icr 2007 : Innovative cryptography / Nick Moldovyan, Alex Moldovyan     
      Innovative cryptography / Nick Moldovyan, Alex Moldovyan MELB  Book 2007
005.82 Mor/Qba    
      Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers / Oliver Morsch MELB, W'PONDS   Book 2008
      Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers / Oliver Morsch MELB, W'PONDS   Book 2008
005.82 Moy/Clf : Cryptographic libraries for developers / Ed Moyle and Diana Kelley     
      Cryptographic libraries for developers / Ed Moyle and Diana Kelley W'PONDS  Book 2006
005.82 Nar/Woe 2008 : Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others]     
      Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others] MELB  Book 2009
005.82 Ned/Eca : Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle     
      Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle W'PONDS  Book 2005
005.82 Ned/Ech : Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors)     
      Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors) W'PONDS  Book 2004
005.82 Ned/Nti : New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors     
      New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors W'PONDS  Book 2006
005.82 Paa/Uca    
      Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl MELB, W'PONDS   Book 2010
      Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl MELB, W'PONDS   Book 2010
005.82 Pan/Iho : Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)     
      Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.) W'PONDS  Book 2009
005.82 Pre/Sai 2005 : Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)     
      Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.) W'PONDS  Book 2006
005.82 Rao/Iha : The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak     
      The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak MELB  Book 2014
005.82 Ros/Iec    
      Implementing elliptic curve cryptography / Michael Rosing MELB, W'PONDS   Book 1999
      Implementing elliptic curve cryptography / Michael Rosing MELB, W'PONDS   Book 1999
005.82 Saf/Mha : MRD hashing / R. Safavi-Naini and C. Charnes     
      MRD hashing / R. Safavi-Naini and C. Charnes WATERFT ADPML  Book 2005
005.82 Sal/Pkc : Public-key cryptography / Arto Salomaa     
      Public-key cryptography / Arto Salomaa W'PONDS  Book 1990
005.82 Sal/Pkc 1996 : Public-key cryptography / Arto Salomaa     
      Public-key cryptography / Arto Salomaa W'PONDS  Book 1996
005.82 San/Vsp : VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz     
      VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz W'PONDS  Book 1991
005.82 Sch/Acp : Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier     
      Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier W'PONDS  Book 1994
005.82 Seb/Cai : Cryptography : an introduction / Nigel Smart     
      Cryptography : an introduction / Nigel Smart MELB  Book 2003
005.82 Sen/Dhf : Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu     
      Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu W'PONDS  Book 2004
005.82 Shi/Tod : Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)     
      Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.) MELB  Book 2006
005.82 Sim/Cct : Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons     
      Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons W'PONDS  Book 1992
005.82 Sta/Can 2011    
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
005.82 Sta/Icw    
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
005.82 Sti/Cta 2006    
      Cryptography : theory and practice / Douglas R. Stinson MELB, W'PONDS   Book 2006
      Cryptography : theory and practice / Douglas R. Stinson MELB, W'PONDS   Book 2006
005.82 Tra/Itc 2006    
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
3 additional entries    
005.82 Tuy/Swn : Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar     
      Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar W'PONDS  Book 2007
005.82 Vie/Nsw : Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra     
      Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra MELB  Book 2002
005.82 Yan/Cao : Cryptanalytic attacks on RSA / Song Y. Yan     
      Cryptanalytic attacks on RSA / Song Y. Yan W'PONDS  Book 2007
005.82 Yan/Pta 2009    
      Primality testing and integer factorization in public-key cryptography / by Song Y. Yan MELB, W'PONDS   Book 2009
      Primality testing and integer factorization in public-key cryptography / by Song Y. Yan MELB, W'PONDS   Book 2009
005.82 You/Mce : Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung     
      Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung W'PONDS  Book 2004
005.82 Zon/Rdi : Robust digital image watermarking / by Tianrui Zong     
      Robust digital image watermarking / by Tianrui Zong MELB THESES  CD-ROM 2015
005.8201512 Kob/Aao : Algebraic aspects of cryptography / Neal Koblitz     
      Algebraic aspects of cryptography / Neal Koblitz MELB  Book 1998
005.824 Dor/Bfc : Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak     
      Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak MELB  Book 2020
005.84 Ala/Aos : Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab     
      Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab MELB THESES  CD-ROM 2014
005.84 Erb/Twa : Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe     
      Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe MELB  Book 2005
005.84 Fil/Cuf : Computer viruses : from theory to applications / Eric Filiol     
      Computer viruses : from theory to applications / Eric Filiol MELB  Book 2005
005.84 Gri/Mmc : Malicious mobile code : virus protection for Windows / Roger A. Grimes     
      Malicious mobile code : virus protection for Windows / Roger A. Grimes W'PONDS  Book 2001
005.84 Mon/Lma : Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A     
      Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A MELB  Book 2018
005.84 Par/Dca : Digital contagions : a media archaeology of computer viruses / Jussi Parikka     
      Digital contagions : a media archaeology of computer viruses / Jussi Parikka WATERFT  Book 2007
005.84 Par/Dca 2016 : Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka     
      Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka MELB  CD-ROM 2016
005.84 Sik/Pma : Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig     
      Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig MELB  Book c2012
005.84 Sin/Imc : Identifying malicious code through reverse engineering / edited by Abhishek Singh     
      Identifying malicious code through reverse engineering / edited by Abhishek Singh MELB  Book 2009
005.84 Xia/Soa : A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury     
      A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury WATERFT ADPML  Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next