Computer security and cryptography
Saved in:
| Main Author: | Konheim 1934- |
|---|---|
| Format: | Book |
| Published: |
Hoboken, N.J.
Wiley-Interscience
c2007
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Cryptography a very short introduction
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2010)
by: Hoffstein, Jeffrey, et al.
Published: (2010)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
An introduction to cryptography
by: Mollin, Richard A. 1947-
Published: (2000)
by: Mollin, Richard A. 1947-
Published: (2000)
Foundations of cryptography
by: Goldreich, Oded
Published: (2003)
by: Goldreich, Oded
Published: (2003)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2014)
by: Hoffstein, Jeffrey, et al.
Published: (2014)
Introduction to cryptography
by: Padhye, Sahadeo, et al.
Published: (2018)
by: Padhye, Sahadeo, et al.
Published: (2018)
Identity-based cryptography
Published: (2009)
Published: (2009)
Mathematical aspects of classical and quantum cryptography
by: Bier
Published: (2004)
by: Bier
Published: (2004)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Computer security
by: Gollman
Published: (2006)
by: Gollman
Published: (2006)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Enhancing cryptographic primitives with techniques from error correcting codes
Published: (2009)
Published: (2009)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Introduction to computer security
by: Bishop, Matt (Matthew A.)
Published: (2005)
by: Bishop, Matt (Matthew A.)
Published: (2005)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
International journal of cryptology research
Published: (2009)
Published: (2009)
Security in computing systems challenges, approaches and solutions
by: Biskup ,J. (Joachim)
Published: (2009)
by: Biskup ,J. (Joachim)
Published: (2009)
Fundamentals of computer security
by: Pieprzyk, Josef 1949-
Published: (2003)
by: Pieprzyk, Josef 1949-
Published: (2003)
Computer system security basic concepts and solved exercises
by: Avoine
Published: (2007)
by: Avoine
Published: (2007)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
Similar Items
-
Introduction to cryptography principles and applications
by: Delfs
Published: (2007) -
Cryptography protocols, design, and applications
Published: (2012) -
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008) -
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015) -
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)


