Language:
English
繁體中文
Help
圖資館首頁
Login
Information security and cryptography,
書目資訊
SCIONa secure internet architecture /
~
Perrig, Adrian.
SCIONa secure internet architecture /
by:
Perrig, Adrian.
Modelling and verification of secure...
~
Giustolisi, Rosario.
Modelling and verification of secure exams
by:
Giustolisi, Rosario.
Computer security and the internetto...
~
SpringerLink (Online service)
Computer security and the internettools and jewels /
by:
SpringerLink (Online service)
Protocols for authentication and key...
~
Boyd, Colin.
Protocols for authentication and key establishment
by:
Boyd, Colin.
The design of Rijndaelthe Advanced E...
~
Daemen, Joan.
The design of Rijndaelthe Advanced Encryption Standard (AES) /
by:
Daemen, Joan.
The science of quantitative informat...
~
Alvim, Mario S.
The science of quantitative information flow
by:
Alvim, Mario S.
The theory of hash functions and ran...
~
Fischlin, Marc.
The theory of hash functions and random oraclesan approach to modern cryptography /
by:
Fischlin, Marc.
Novel techniques in recovering, embe...
~
Lin, Yan.
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
by:
Lin, Yan.
Tutorials on the foundations of cryp...
~
Lindell, Yehuda.
Tutorials on the foundations of cryptographydedicated to Oded Goldreich /
by:
Lindell, Yehuda.
Secure data deletion
~
Reardon, Joel.
Secure data deletion
by:
Reardon, Joel.
Cryptography made simple
~
Smart, Nigel P.
Cryptography made simple
by:
Smart, Nigel P.
Introduction to cryptographyprincipl...
~
Delfs, Hans.
Introduction to cryptographyprinciples and applications /
by:
Delfs, Hans.
The hash function BLAKE
~
Aumasson, Jean-Philippe.
The hash function BLAKE
by:
Aumasson, Jean-Philippe.
Cryptography in constant parallel time
~
Applebaum, Benny.
Cryptography in constant parallel time
by:
Applebaum, Benny.
Operational semantics and verificati...
~
Cremers, Cas.
Operational semantics and verification of security protocols
by:
Cremers, Cas.
Fault analysis in cryptography
~
Joye, Marc.
Fault analysis in cryptography
by:
Joye, Marc.
The block cipher companion
~
Knudsen, Lars R.
The block cipher companion
by:
Knudsen, Lars R.
The LLL algorithmsurvey and applicat...
~
Nguyen, Phong, Q.
The LLL algorithmsurvey and applications /
by:
Nguyen, Phong, Q.
Advanced statistical steganalysis
~
Bohme, Rainer.
Advanced statistical steganalysis
by:
Bohme, Rainer.
Practical signcryption
~
Dent, Alexander W.
Practical signcryption
by:
Dent, Alexander W.
Processing
...
Change password
Login