Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Cryptography
Data encryption (Computer science)
(4)
Coding theory
(2)
Combinatorial designs and configurations
(2)
Curves, Elliptic
(2)
Electronic books
(2)
more ...
Additional Suggested Topics
... within your search.
Machine theory
(2)
Adaptive computing systems
(1)
Computational complexity
(1)
Computer software development
(1)
Database security
(1)
Field programmable gate arrays
(1)
Mathematics
(1)
less ...
Showing
1
-
12
of
12
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Cryptography in the database : the last line of defense /
by
Kenan, Kevin
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography : theory and practice /
by
Stinson, Douglas R
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Complexity and cryptography : an introduction /
by
Talbot, John
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Handbook of elliptic and hyperelliptic curve cryptography /
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Authentication codes and combinatorial designs /
by
Pei, Dingyi
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Handbook of elliptic and hyperelliptic curve cryptography
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Authentication codes and combinatorial designs
by
Pei, Dingyi.
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Authentication codes and combinatorial designs
by
Pei, Dingyi.
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Introduction to cryptography : with coding theory /
by
Trappe, Wade
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Quantum cryptography and secret-key distillation /
by
Assche, Gilles Van
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptographic algorithms on reconfigurable hardware /
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptographic libraries for developers /
by
Moyle, Ed
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2006
Call Number: Q - Science
Suggested Topics: Cryptography
Institution
KMUTT
(12)
Library
mai
(4)
Format
MONOGRAPHS
(4)
Call Number
Q - Science
Author
Pei, Dingyi
(3)
Assche, Gilles Van
(1)
Kenan, Kevin
(1)
Moyle, Ed
(1)
Stinson, Douglas R
(1)
more ...
Talbot, John
(1)
Trappe, Wade
(1)
less ...
Language
English
(12)
Genre
Electronic books
(3)
Handbooks, manuals, etc
(1)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website