Your search returned 215 results.

Sort
Results
61.
Secure communications applications and management by Roger J. Sutton by
  • Sutton, Roger J
Series: Wiley series in communications networking & distributed systems
Material type: Text Book
Publication details: Chichester John wiley & sons 2002
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 621.3820285582 P02.

62.
Introduction to cryptography Principles and applications By Hans Delfs, Helmut Knebl by
  • Delfs, Hans
  • Knebl, Helmut
Series: Information security and cryptography texts and monographs
Material type: Text Book
Publication details: Berlin Springer 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 652.8 P02 R(T).

63.
Cryptography an introduction ed by V. V. Yaschenko by
  • Yaschenko, V. V., ed
Series: Student mathematical library ; vol.18
Material type: Text Book
Publication details: United States of America American Mathematical Society 2002
Availability: Items available for loan: Mathematics (1)Call number: 005.82 P022.

64.
Proceedings New security paradigms workshop 2002 Ed. by Christian F. Hempelmann, victor Raskin by
  • New security paradigms workshop (Virginia Beach, september 23-29)
  • Raskin, Victor, ed
  • Hempelmann, Christian F., ed
Material type: Text Book
Publication details: New York ACM Order Department 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P021.

65.
Finite fields with applications to coding theory, cryptography and related areas proceedings... by
  • International conference on finite fields and application(6th Oaxaca 2001)
  • Mullen, Gary L., ed
  • Stichtenoth, Henning, ed
  • Tapia-Recillas, Horacio, ed
Material type: Text Book
Publication details: Berlin Springer-Verlag 2002
Availability: Items available for loan: Mathematics (1)Call number: 003.54015123 P02.

66.
Elliptic curves number theory and cryptography by Lawrence C. Washington by
  • Washington, Lawrence C
Series: Discrete mathematics and its applications
Material type: Text Book
Publication details: Boca Raton Chapman and Hall 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 516.352 P032.

67.
Introduction to cryptography by Richard A. Mollin by
  • Mollin, R. A
Series: CRC press series on discrete mathematics and its applicaions
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P012.

68.
Introduction to cryptography by Johannes A. Buchmann by
  • Buchmann, Johannes A
Series: Undergraduates texts in mathematics
Material type: Text Book
Publication details: New York Springer 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P01;1.

69.
Performance, computing, and communications conference. IPCCC 2003. Proceedings ed. by Alan D George et al., by
  • IEEE International performance, computing, and communications (22 2003 Phoenix)
  • George, Alan D., ed. et al
Material type: Text Book
Publication details: Piscataway IEEE 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005 P03 "SER".

70.
Elliptic curves, modular forms and cryptography ed by A. K. Bhandari et al. by
  • Advanced instructional workshop on algebraic number theory (Allahabad 2000)
  • Bhandari, A. K., ed
  • Nagaraj, D. S., ed
  • Ramakrishnan, T. N., ed. Venkataraman, T. N
Material type: Text Book
Publication details: New Delhi Hindustan book agency 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 512.74 P03.

71.
Fundamental of cryptology A professional reference and interactive tutorial (e-book) by Tilborg, C A Van Henk by
  • Tilborg
  • Henk, C A Van
Material type: Text Book
Publication details: New York Kluwer 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P023.

72.
CCS 2003 Proceedings ed by Vijay Atluri and Peng Liu by
  • ACM Conference on Computer and communications Security(10th 2003 Washington)
  • Atluri, Vijay., ed
  • Liu, Peng., ed
Material type: Text Book
Publication details: New York ACM Press 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 621.38928 P032.

73.
Some investigations on performance improvement of turbo decoders by J Srivatsava by
  • Srivatsava, J
Series: IISc., Dept. of CEDT. MSc(Engineering), Thesis
Material type: Text Book
Publication details: Bangalore IISC 2004
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8201154 P04 "THESIS".

74.
Quantum communication, measurement and computing ed by Stephen M. Barnett, et al., by
  • International conference on quantum communication, measurement and computing (7 2004 Glasgow)
  • Barnett, Stephen M., ed. et al
Series: AIP Conference proceedings. Vol.734
Material type: Text Book
Publication details: Melville American institute of physics 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 003.54 P042.

75.
Smart cards in e-security ed by A Prabhakar and S Swarn by
  • Prabhakar, A., ed
  • Swarn, S., ed
Material type: Text Book
Publication details: New Delhi Ajanta books international 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P031.

76.
SACMAT 2005 Proceedings by
  • ACM Symposium on access control models and technologies (10 Stockholm, Sweden 2005)
Material type: Text Book
Publication details: Sweden ACM press 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P051.

77.
Quantum theory ed by Guillaume Adenier, Andrei Yu. Khrennikov, Theo M. Nieuwenhuizen by
  • Reconsideration of foundations-3 (2005 Vaxjo)
  • Adenier, Guillaume. ed
  • Khrennikov, Andrei Yu. ed
  • Nieuwenhuizen, Theo M., ed
Series: AIP Conference proceedings. Vol.810
Material type: Text Book
Publication details: Melville American institute of physics 2006
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 530.12 P053.

78.
Proceedings of the 12th ACM Conference on Computer and Communications Security ed By Catherine Meadows and Paul Syverson by
  • ACM Conference on Computer and Communications Security (2005
  • Meadows Catherine et al
Material type: Text Book
Publication details: New Y0rk ACM Press,SIGSAC. 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P052.

79.
Number Theory in science and communication With Applications in cryptography, Physics, Digital information, Computing and Self-similarty Manfred R Schroeder by
  • Schroeder, Manfred R
Series: Information science
Edition: 4th ed
Material type: Text Book
Publication details: New York springer Berlin Heidelberg, New York 2006
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 512.7 P061.

80.
Cryptography theory and practice by Douglas R Stinson by
  • Stinson, Douglas R
Series: Discrete mathematics and its applications
Edition: 3 ed
Material type: Text Book
Publication details: London Chapman 2006
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P06.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha