Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Search Selected
Select All
<<   Previous     Next   >>
Title Main Entry Publication Date
Advances in cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA August 15-19, 1999 proceedings / CRYPTO (Conference) 1999 : Santa Barbara, Calif.) c1999.
The crypto controversy : a key conflict in the Information Society / Koops, Bert-Jaap. c1999.
Crypto-fetishisim Rickels, Laurence A. c2002-
The cryptoclub using mathematics to make and break secret codes / Beissinger, Janet. c2006.
The cryptoclub using mathematics to make and break secret codes workbook / Beissinger, Janet. c2006.
Cryptococcus from human pathogen to model yeast /   c2011.
إصدار العملات المشفرة: القيود والآثار دراسة فقهية/ السعدي، محمد عمر، 2020.
Cryptogamic botany / Smith, Gilbert Morgan , 1885-1959 1955.
Cryptogamic botany/ Smith, Gilbert Morgan, 1885. 1972.
Cryptogamic botany/ Smith, Gilbert Morgan, 1885. 1955.
CRYPTOGAMIC plants of the UE SSR (Flora sporovykh rastenii SSSR).   1970.
Cryptographic Algorithms on Reconfigurable Hardware Rodríguez-Henríquez, Francisco. 2006.
Cryptographic Boolean functions and applications / Cusick, Thomas W., 1943- 2009.
Cryptographic Engineering Koç, Çetin Kaya. 2009.
Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings Rao, Josyula R. 2005
Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings Goubin, Louis. 2006
Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings / Paillier, Pascal. 2007.
Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings / Clavier, Christophe. 2009.
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings / Preneel, Bart. 2011.
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / Prouff, Emmanuel. 2012.
Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings / Bertoni, Guido. 2013.
Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings /   2014.
Cryptographic Hardware and Embedded Systems – CHES 2017 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings /   2017.
Cryptographic hardware and embedded systems : First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999 : proceedings/ CHES'99: (1999: Worcester, Mass,USA. 1999.
Cryptographic hardware and embedded systems--CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings / CHES 2000 2000 Worcester, Mass.) 2000.
Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings/ CHES 2001: (2001: Paris,France. 2001.
Cryptographic hardware and embedded systems--CHES 2002 : 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002 : revised papers/ CHES 2002: (2002: Redwood City , Calif,USA. 2002.
Cryptographic hardware and embedded systems, CHES 2003 : 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings/ CHES 2003: (2003: Cologne,Germany. 2003.
Cryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, 2004 : proceedings/ CHES 2004: (2004: Cambridge,USA. 2004.
Cryptographic hardware and embedded systems -- CHES 2005 : 7th international workshop, Edinburgh, UK, August 29-September 1, 2005 : proceedings/ CHES 2005: (2005: Edinburgh,Scotland, UK. 2005.
Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings / Mangard, Stefan. 2010.
Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings /   2015.
Cryptographic key-based algorithms over Internet communication channels using secured sockets interface-an implementation approach / Khateeb, Adel A. M. 2000.
Cryptographic key-based algorithms over internet communication channels using secured sockets interface-an implementation approach / Khateeb, Adel A. M. 2000.
Cryptographic Protocol Security Analysis Based on Trusted Freshness / Dong, Ling. 2012.
Cryptographic security architecture : design and verification / Gutmann, Peter. c2004.
CryptoGraphics Exploiting Graphics Cards for Security / Cook, Debra L. 2006.
An introduction to cryptography / Mollin, Richard A., 1947- c2001.
Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems / Meyer, Carl H. 1982.
Cryptography : an introduction/ Smart,Nigel 2003.
Cryptography : an introduction to computer security / Seberry, Jennifer, 1944- c1989.
Cryptography : an introduction to computer security / Seberry, Jennifer, 1944- c1989.
Cryptography : policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings /   c1996.
Cryptography / Rubinstein-Salzedo, Simon, [2018]
Cryptography : theory and practice / Stinson, Douglas R. (Douglas Robert), 1956- 2006.
Cryptography : theory and practice / Stinson, Douglas R. (Douglas Robert), 1956- c2002.
Cryptography : theory and practice / Stinson, Douglas R. (Douglas Robert), 1956- 2019.
Cryptography, a primer / Konheim, Alan G., 1934- c1981.
Cryptography: an introduction/ Smart, Nigel. 2003.
Cryptography and coding /   1989.
Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings Smart, Nigel. 2005
Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings / Galbraith, Steven D. 2007.
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings / Parker, Matthew G. 2009.
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings / Chen, Liqun. 2011.
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings / Stam, Martijn. 2013.
Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings /   2015.
Cryptography and computational number theory/   2001.
Cryptography and data security / Denning, Dorothy Elizabeth Robling, 1945 c1982.
Cryptography and Information Security / PACHGHARE, V.K. 2009.
Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /   2015.
Cryptography and logarithms over finite fields ElGamal, Taher A. 1984.
التعمية و أمن الشبكات = Cryptography and network security/ الناظر، سائد محمود. 2005.
Cryptography and network security Stallings, William 2005
Cryptography and network security / Kahate, Atul, 2018.
Cryptography and network security / Forouzan, Behrouz A. 2008, 2009 reprint.
Cryptography and network security : principles and practice / Stallings, William. 2003.
Cryptography and network security : principles and practice / Stallings, William. 2011.
Cryptography and network security : principles and practice / Stallings, William. c2011.
Cryptography and network security : principles and practice / Stallings, William. [2014]
Cryptography and network security : principles and practice / Stallings, William 2016
Cryptography and network security : principles and practice / Stallings, William, c2003.
Cryptography and network security : principles and practice / Stallings, William, [2017] 2017
Cryptography and network security : principles and practice / Stallings, William. c1999.
Cryptography and network security : principles and practice / Stallings, William, [2017] 2017
Cryptography and network security : principles and practice / Stallings, William. c2006.
Cryptography and network security : principles and practice / Stallings, William 2016
Cryptography and network security : principles and practice / Stallings, William, 2014.
Cryptography and network security : principles and practices / Stallings, William. أ2006.
Cryptography and network security : principles and practices / Stallings, William. c2006.
Cryptography and secure communications/ Mirza, Nabil M. K. 2001.
Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday / Naccache, David. 2012.
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings /   2014.
التشفير بطريقة (هل) باستخدام نظام EBCDIC / قدورة، عبد القادر. 2012.
Cryptography for database and internet applications: Developing secret and piblic key techniques with java / Galbreath, Nick. 2002.
Cryptography for developers St. Denis, Tom. c2007.
Cryptography for Internet and database applications : developing secret and public key techniques with Java / Galbreath, Nick, 1970- c2002.
Cryptography in C and C++ Welschenbach, Michael. 2005.
Cryptography in C and C++ Welschenbach, Michael. 2013.
Cryptography in Constant Parallel Time Applebaum, Benny. 2014.
Cryptography in the database : the last line of defense/ Kenan,Kevin 2006.
Cryptography Made Simple Smart, Nigel P. 2016.
Cryptography's role in securing the information society   1996.
Cryptology : machines, history, & methods /   c1989.
Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public / Beutelspacher, Albrecht. c1994.
Cryptology : classical and modern / Klima, Richard E., 2018.
Cryptology : machines, history, & methods /   c1989.
Cryptology and computational number theory /   c1990.
Radio frequency identification system security RFIDsec'10 Asia workshop proceedings / RFIDsec'10 Asia. Workshop on RFID Security (2010 Feb. 22-23 : Singapore) c2010.
Identity-based cryptography   c2009.
Radio frequency identification system security RFIDsec'11 Asia Workshop proceedings / RFIDsec'11 (2011 : Wuxi, China) 2011.
<<   Previous     Next   >>