Your search returned 30 results.

Sort
Results
1.
Applied cryptography Protocols, algorithms, and source code in C by Bruce Schneier by
  • Schneier, Bruce
Edition: 2nd ed.
Material type: Text Book
Publication details: New York John Wiley 1996
Availability: Items available for reference: Computer Science and Automation: Not for loan (1)Call number: 005.82 N96;3 (CSA).

2.
Information security-management Concepts and Pratice by Bell G Raggad by
  • Raggad, Bell G
Material type: Text Book
Publication details: New York CRC Press 2010
Availability: Items available for loan: Computational Data Scince (1)Call number: 005.8 P10 (CSA).

3.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082 (CSA).

4.
Network anomaly detection a machine learning perspective by Dhruba Kumar Bhattacharyya and Jugal Kumar Kalita by
  • Bhattacharyya, Dhruba Kumar
  • Kalita, Jugal Kumar
Material type: Text Book
Publication details: New York CRC Press 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P14 (CSA).

5.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082;1 (CSA).

6.
Applied cryptography Protocols, algorithms, and source code in C by Bruce Schneier by
  • Schneier, Bruce
Material type: Text Book
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 N96;4 (CSA).

7.
Cryptography and network security Principles and practice by William Stallings by
  • Stallings, William
Edition: 6th ed
Material type: Text Book
Publication details: Boston Columbus Pearson 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P14 (CSA).

8.
Introduction to modern cryptography by Katz Jonathan and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Edition: 2nd ed.
Material type: Text Book
Publication details: Boca Rotan CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P15;1 (CSA).

9.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Edition: 2nd ed
Material type: Text Book
Publication details: Boca Raton CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P15 (CSA).

10.
Efficient secure two-party protocols : Techniques and constructions by
  • Hazay, Carmit, Lindell, Lehuda
Material type: Text Book
Publication details: London Springer 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P10;1 (CSA).

11.
Digital signatures by
  • Katz, Jonathan,
Material type: Text Book
Publication details: New York Springer 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P10;1 (CSA).

12.
Secure Multiparty Computation and Secret Sharing by Ronald Cramer, Ivan Bjerre Damgard and Jesper Buus Nielsen by
  • Cramer, Ronald
  • Damgard, Ivan Bjerre
  • Nielsen, Jesper Buus
Material type: Text Book
Publication details: Cambridge CUP 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P151 (CSA).

13.
Hardware security: Design, threats and safeguards by Debdeep Mukhopadhyay by
  • Mukhopadhyay, Debdeep
Material type: Text Book
Publication details: Boca Raton CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P153 (CSA).

14.
Modern cryptography, Probabilistic proofs and pseudorandomness by Oded Goldreich by
  • Goldreich, Oded
Series: Algorithms and combinatorics ; vol 17
Material type: Text Book
Publication details: Berlin Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 511.6 N99 (CSA).

15.
Modern cryptography, probabilistic proofs, and pseudorandomness Oded Goldreich by
  • Goldreich Oded
Series: Algorithms and combinatorics ; 17
Material type: Text Book
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P (CSA).

16.
Modern cryptography probabilistic proofs and pseudo-randomness by by O Goldreich by
  • Goldreich, O
Material type: Text Book
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 511.6 N99;1 (CSA).

17.
Analyzing computer security by Charles P Pfleeger and Shari Lawrence Pflleeger by
  • Pfleeger, Charles P
  • Peleeger, Shari Lawrence
Material type: Text Book
Publication details: New Delhi Pearson 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P141 (CSA).

18.
Cryptanalysis of RSA and its variants by M Jason Hinek by
  • Hinek, M Jason
Material type: Text Book
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P102 (CSA).

19.
Art of memory forensics: detecting malware and threats in windows linux and mac memory by Michael Hale Ligh., et al by
  • Ligh, Michael Hale
Material type: Text Book
Publication details: New Dehli Wiley India 2016
Availability: Items available for loan: Computer Science and Automation (1)Call number: 004.5028558 P14 (CSA).

20.
Cryptography and network security: Principles and practice by William Stallings by
  • Stallings, William
Edition: 7th ed
Material type: Text Book
Publication details: Noida Pearson 2017
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P17 (CSA).

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha