Your search returned 215 results.

Sort
Results
121.
Cryptography and data security by Dorothy Elizabeth Robling Denning by
  • Denning, Dorothy Elizabeth Robling
Material type: Text Book
Publication details: Reading Addison-Wesley Pub. 1982
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 001.64028 N82.

122.
Foundations of Security What every Programmer Needs to Know by Neil Daswani by
  • Daswani, Neil. et al
  • Kern Christoph
  • Kesavan Anita
Material type: Text Book
Publication details: United States of America Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P07.

123.
Foundations of Security What Every Programmer Needs to Know by Neil, Daswani by
  • Daswani, Neil. et al
  • Kern Christoph
  • Kesavan Anita
Material type: Text Book
Publication details: United States of America Springer 2007
Availability: Not available: JRD Tata Memorial Library: Checked out (1).

124.
Information integrity issues and approaches by V Rajaraman and Vijay V Mandke by
  • Rajaraman, V
  • Mandke, Vijay V
Material type: Text Book
Publication details: New Delhi Information integrity foundation 1996
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N952.

125.
Polymorphic finite field multiplier by Saptarsi Das by
  • Das,Saptarsi
Series: IISc, Dept. of CEDT, MSc. Thesis
Material type: Text Book
Publication details: Bangalore IISc Press 2011
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 621.3845028582 P11 "THESIS".

126.
Finite fields and applications by Gary L Mullen and Carl Mummert by
  • Mullen, Gary L
  • Mummert, Carl
Series: Student mathematical library ; V.41
Material type: Text Book
Publication details: India AMS 2012
Availability: Items available for loan: Mathematics (1)Call number: 512.74 P121 (MA).

127.
Anonymity with authenticity by D Swaroop by
  • Swaroop, D
Series: IISc, Dept. of ECE MSc (Engg) Thesis
Material type: Text Book
Publication details: Bangalore IISc 2011
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 P111 "THESIS".

128.
New Approaches and Experimental Studies on Algebraic Attacks on Stream Ciphers by N Rajesh Pillai by
  • Pillai, N Rajesh
Series: IISc, Dept. of CSA PhD Thesis
Material type: Text Book
Publication details: Bangalore IISc 2011
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 P11 "THESIS".

129.
Memory efficient regular expression pattern matching architecture for network intrusion detection systems by Pawan Kumar by
  • Kumar, Pawan
Series: IISc, Dept of SERC MSc (Engg) Thesis
Material type: Text Book
Publication details: Bangalore IISc 2012
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 P12 "THESIS".

130.
Applied Cryptography and Network Security [electronic resource] Proceedings ed by Jonathan Katz by
  • International Conference, ACNS (5 China 2007)
  • Katz, Jonathan., ed
Material type: Text Book
Publication details: Berlin Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 (e-book).

131.
Cryptography and Coding [electronic resource] Proceedings ed by Steven D Galbraith by
  • IMA International Conference (11 UK 2007)
  • Galbraith, Steven D
Material type: Text Book
Publication details: Berlin Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 (e-book).

132.
Pairing-Based Cryptography . Pairing 2007 [electronic resource] Proceedings ed by Tsuyoshi Takagi and et al by
  • International Conference (Tokyo 2007)
  • Takagi, Tsuyoshi., ed. et al
Material type: Text Book
Publication details: Berlin Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 (e-book).

133.
Selected Areas in Cryptography [electronic resource] Proceedings ed by Ali Miri and Michael Wiener by
  • International Workshop, SAC (14 Canada 2007)
  • Miri, Ali
  • Wiener, Michael
Material type: Text Book
Publication details: Berlin Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 (e-book).

134.
Financial Cryptography and Data Security [electronic resource] Proceedings ed by Sven Dietrich and Rachna Dhamija by
  • Intnal Confnc &wrksp on Usable Security (11 tri&Tobago 2007
  • Dietrich, Sven
  • Dhamija, Rachna
Material type: Text Book
Publication details: Berlin Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 (e-book).

135.
Foundations of Cryptography. Vol.1 Basic Tools by Oded goldrich by
  • Goldreich, Oded
Material type: Text Book
Publication details: UK Cambridge University Press 2005
Availability: Items available for loan: Computer Science and Automation (1)Call number: 652.8 P05.1 (CSA).

136.
Foundations of cryptography. Vol.2 Basic Application by Oded Goldreich by
  • Goldreich, Oded
Material type: Text Book
Publication details: UK Cambridge University Press 2005
Availability: Items available for loan: Computer Science and Automation (1)Call number: 652.8 P05.2 (CSA).

137.
Handbook of Applied Cryptography by Alfred J Menezes, Paul C Van Oorschot & Scott A Vanstone by
  • Menezes, Alfred J
  • Van Oorschot, Paul C
  • Vanstone, Scott A
Series: Discrete mathematics and its applications
Material type: Text Book
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P10 (CSA).

138.
Introduction To Cryptography by Johannes Buchmann by
  • Buchmann, Johannes
Series: Undergraduate texts in Mathematics
Edition: 2nd
Material type: Text Book
Publication details: Berlin Springer 2004
Availability: Items available for loan: Mathematics (1)Call number: 005.82 P043 (MA).

139.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082 (CSA).

140.
Algebraic geometry in coding theory and cryptography by Harald Neiderreiter by
  • Niederreiter, Harald
Material type: Text Book
Publication details: Princeton Princeton University Press 2009
Availability: Items available for loan: Computer Science and Automation (1)Call number: 003.54 P091 (CSA).

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha