Your search returned 77 results.

Sort
Results
Encyclopedia of cryptography and security ed. by Henk C. A. Van Tilborg and Sushil Jajdia by
  • Tilborg, Henk C. A. Van; ed [ed. by]
Edition: 2nd ed.
Publication details: Dordrecht Springer 2011
Availability: Items available for reference: University Library : Not for loan (2)Call number: 004.056.523 TIL.1 R, ...
Security for wireless sensor networks using identity based cryptography Harsh Kupwade Patil and Stephen A Szygenda by
  • Patil, Harsh Kupwade
Publication details: Boca Raton CRC Press 2013
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 PAT.
New directions of modern cryptography by
  • Cao, Zhenfu
Publication details: Boca Raton CRC Press 2013
Availability: Items available for loan: University Library (1)Call number: 004.056.523 CAO.
Fundamentals of information systems security David Kim and Michael G Soplomon by
  • Kim, David
  • Solomon, Michael G
Edition: 2nd. ed
Publication details: Wellstreet Jones & Bartlett Learning 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KIM.
Approach towards the development of an efficient symmetric key encryption scheme Paul A J; guided by P Mythili and K Poulose Jacob by
  • Paul, A J
  • Mythili P'guided by
  • Poulose Jacob; K guided by
Publication details: Kochi Faculty of Enineering, CUSAT 2012
Availability: Items available for reference: University Library : Not for loan (1)Call number: 004.056.55 PAU T.
Computational number theory by
  • Das, Abhijit
  • Rosen, Kenneth H; ed. by
Series: Discrete mathematics and its applications
Publication details: Boca Raton CRC Press 2013
Availability: Items available for loan: University Library (1)Call number: 511:004.421.2 DAS.
Network security essentials applications and standards by
  • `Stallings, William
Edition: 4th ed.
Publication details: Chennai Pearson 2013
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 STA.
Cryptography and network security: principles and practice by
  • Stallings, William
Edition: 6th ed.
Publication details: New Delhi Pearson 2014
Availability: Items available for loan: University Library (2)Call number: 004.056.523 STA"2014", ...
Cryptography and network security Behrouz A Forouzan and Debdeep Mukhopadhyay by
  • Forouzan, Behrouz A
  • Mukhopadhyay, Debdeep
Edition: 2nd ed.
Publication details: New Delhi Tata Macgraw Hill 2014
Availability: Items available for loan: University Library (2)Call number: 004.056.523 FOR, ...
Access control, authentication and public key infrastructure Mike Chapple...[et.al] by
  • Chapple, Mike...[et.al]
Series: Information systems security and assurance series
Edition: 2nd ed.
Publication details: Burlington Jones and Bartlett learning 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.523 CHA.
Introduction to cryptography with Maple by
  • Gómez Pardo, José Luis
Publication details: New York : Springer-Verlag, 2013
Availability: Items available for loan: University Library (1)Call number: 004.056.523 GOM.
Integer algorithms in cryptology and information assurance by
  • Verkhovsky, Boris S
Publication details: Singapore World scientific publishing 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.523:510.5 VER.
Cryptography and network security by
  • Gupta, Prakash C
Publication details: Delhi PHI learning private limited 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.55 GUP.
Information theory and coding Murlidhar Kulkarni and K.S.Shivaprakasha by
  • Kulkarni, Murlidhar
Publication details: New Delhi Wiley India 2015
Availability: Items available for loan: University Library (1)Call number: 519.72 KUL.
Iris biometric model for secured network access by
  • Khoury, Franjieh El
Publication details: Boca Raton Taylor & Francis 2013
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 KHO.
Nonlinear Laser Dynamics From Quantum Dots to Cryptography by
  • Ludge, Kathy
Publication details: Wiley 2012
Availability: Items available for loan: University Library (1).
An introduction to the theory of numbers by
  • Niven, Ivan
Edition: 5th ed.
Publication details: New Delhi Wiley and sons 2015
Availability: Items available for loan: University Library (1)Call number: 511 NIV;1. Not available: University Library : Checked out (2).
Cryptography and network security by
  • Kahate, Atul
Edition: 3rd ed.
Publication details: New Delhi McGraw Hill education 2014
Availability: Items available for loan: University Library (4)Call number: 004.056.55 KAH"2013", ...
Everyday cryptography fundamental principles and applications by
  • Martin, Keith M
Publication details: Oxford Oxford university press 2012
Availability: Items available for loan: University Library (1)Call number: 004.056.523 MAR.
Cryptography and secure communication by
  • Blahut, Richard E
Publication details: New York Cambridge university press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.55 BLA.
Pages
University Library, CUSAT