Your search returned 23 results.

Sort
Results
Basic Methods of Cryptography by
  • Lubbe, Jan C A Van Der
  • Gee, Steve
Publication details: Cambridge Cambridge University Press 1998
Availability: Not available: University Library : Checked out (1).
Data privacy and security by
  • Salomon, David []
Edition:
Publication details: New York Springer 2003
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SAL.
Selected areas in cryptography: 7th annual international workshop, SAC 2000 Waterloo, Ontario, Canada, August 14-15, 2000 proceedings by
  • Stinson, Douglas R
  • Tavares, Stafford
Publication details: Berlin Springer-Verlag 2001
Availability: Items available for loan: University Library (1)Call number: 004.056.523 STI.
code book: the science of secrecy from ancient Egypt to quanttum cryptography by
  • Singh, Simon
Publication details: New York Anchor Books 1999
Availability: Items available for loan: University Library (1)Call number: 004.056.523 SIN.
Turbo-like codes: design for high speed decoding by
  • Abbasfar, Aliazam
Publication details: Dordrecht Springer 2007
Availability: Items available for loan: University Library (1)Call number: 004.415.3 ABB .
Codes: the guide to secrecy from ancient to modern times by
  • Mollin, Richard A
Publication details: Boca Raton Chapman and Hall/CRC 2005
Availability: Items available for loan: University Library (1)Call number: 004.056.55 MOL.
Internet cryptography by
  • Smith, Richard E
Publication details: New Delhi Pearson Education 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.523 SMI.
Introduction to cryptography With mathematical foundations and computer implementations by
  • Stanoyevitch, Alexander
Series: Discrete mathematics and its applications
Publication details: Boca Raton CRC 2011
Availability: Items available for loan: University Library (1)Call number: 004.056.55 STA.
Steganography in digital media principles, algorithms and applications by
  • Fridrich, Jessica
Publication details: Cambridge Cambridge University Press 2010
Availability: Items available for loan: University Library (1)Call number: 004.056.55 FRI.
Digital images stegnography concepts, algorithms and applications by
  • Cheddad, Abbas
Publication details: Saarbrucken VDM Verlag 2009
Availability: Items available for loan: University Library (1)Call number: 004.056.55 CHE.
Burdens of proof cryptographic culture and evidence law in the age of electronic documents by
  • Blanchette, Jean - Francois
Publication details: London MIT Press 2012
Availability: Items available for loan: University Library (1)Call number: 347.949 BLA.
Computational number theory by
  • Das, Abhijit
  • Rosen, Kenneth H; ed. by
Series: Discrete mathematics and its applications
Publication details: Boca Raton CRC Press 2013
Availability: Items available for loan: University Library (1)Call number: 511:004.421.2 DAS.
Introduction to cryptography with Maple by
  • Gómez Pardo, José Luis
Publication details: New York : Springer-Verlag, 2013
Availability: Items available for loan: University Library (1)Call number: 004.056.523 GOM.
Cryptography and network security principles and practice by
  • Stallings, William
Edition: 6th ed.
Publication details: Noida Pearson 2015
Availability: Items available for loan: University Library (4)Call number: 004.056.523 STA "2014";1, ...
Cryptography primer secrets and promises by
  • Klein, Philip N
Publication details: New York Cambridge university press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.55 KLE.
Embedded multimedia security systems algorithms and architectures by
  • Pande, Amit
  • Zambreno,Joseph
Publication details: New York Springer 2013
Availability: Items available for loan: University Library (1)Call number: 004.032.6:004.056 PAN.
Guide to cloud computing principles and practice by
  • Hill, Richard...[etal]
Series: Computer communication and networks
Publication details: London Springer 2013
Availability: Items available for loan: University Library (1)Call number: 004.75 HIL.
Data hiding techniques in windows OS a practical approach to investigation and defense by
  • Hassan, Nihad Ahmad
  • Hijazi, Ram
Publication details: United states Syngress 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.523 HAS.
Group theoretic cryptography by
  • Vasco, Maria Isabel Gonzalez
  • Steinwandt, Rainer
Series: Chapman & Hall/CRC cryptography and network security
Publication details: Boca Raton CRC press 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.523 VAS.
Information hiding Stefan Katzenbeisser, Fabien Petitcolas. by
  • Katzenbeisser, Stefan [author.]
  • Petitcolas, Fabien A. P
Series: Artech House information security and privacy series
Publication details: Boston Artech house 2016
Availability: Items available for loan: University Library (1)Call number: 004.056.5 KAT.
Pages
University Library, CUSAT