Your search returned 25 results.

Not what you expected? Check for suggestions
Sort
Results
21.
Identity-based cryptography / edited by Marc Joye and Gregory Neven. by Series: Cryptology and information security series ; v. 2.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : IOS Press, ©2009
Online resources:
Availability: Items available for loan: e-Library (1).
22.
Basics of contemporary cryptography for IT practitioners / Boris Ryabko, Andrey Fionov. by Series: Series on coding theory and cryptology ; 1.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Singapore ; Hackensack, NJ : World Scientific, ©2005
Online resources:
Availability: Items available for loan: e-Library (1).
23.
Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others]. by Series: Frontiers in artificial intelligence and applications ; v. 128.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Washington, DC : IOS Press, ©2005
Other title:
  • IWAP 2005
Online resources:
Availability: Items available for loan: e-Library (1).
24.
Intelligent watermarking techniques / editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain. by Series: Series on innovative intelligence ; v. 7.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: River Edge, N.J. : World Scientific, ©2004
Online resources:
Availability: Items available for loan: e-Library (1).
25.
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha