Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Cryptography
Computer security
(82)
Computer access control
(37)
Coding theory
(32)
Number theory
(24)
Data encryption (Computer science)
(20)
more ...
Additional Suggested Topics
... within your search.
Electronic books
(20)
Congresses
(12)
Computer network security
(9)
Computational complexity
(8)
Ciphers
(6)
Computer networks
(5)
Electronic data processing
(5)
Field programmable gate arrays
(4)
Telecommunication
(4)
วิทยาการรหัสลับ
(4)
Authentication
(3)
Computers
(3)
Curves, Elliptic
(3)
Data protection
(3)
Telecommunication systems
(3)
Combinatorial designs and configurations
(2)
Data encryption (Computer science)|
(2)
Data transmission systems
(2)
Electronic mail systems
(2)
Machine theory
(2)
Mathematics
(2)
Proof theory
(2)
Security systems
(2)
Stream ciphers
(2)
less ...
Showing
1
-
20
of
150
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
การเปรียบเทียบสมรรถนะสถาปัตยกรรมรหัสลับ DES บน FPGAs ในอนุกรม XC4000E/X = A...
by
สาวิตร์ ตัณฑนุช
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
การพัฒนาระบบรหัสลับ IDEA ด้วย FPGA และไมโครคอนโทรลเลอร์ = Improvement of IDEA systems using...
by
สาวิตร์ ตัณฑนุช
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Practical cryptiligy and web security /
by
Yuen, P.K
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Contemporary crytography /
by
Oppliger, Rolf
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Complexity theory and cryptology : an introduction to cryptocomplexity /
by
Rothe, Jorg
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography in the database : the last line of defense /
by
Kenan, Kevin
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography : theory and practice /
by
Stinson, Douglas R
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Basics of contemporary cryptography for IT practitioners /
by
Ryabko, Boris
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography, information theory, and error-correction : a handbook for the 21st century /
by
Bruen, Aiden A
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
How to bypass the wassenaar arrangement : A new application for watermarking
by
Leprevost, Franck
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Complexity and cryptography : an introduction /
by
Talbot, John
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Handbook of elliptic and hyperelliptic curve cryptography /
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Authentication codes and combinatorial designs /
by
Pei, Dingyi
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Resettable zero-knowledge
by
Canetti, Ran
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Complete characterization of security notions for probabilistic private-key encryption
by
Katz, Jonathan
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
On zero-knowledge proofs: "from membership to decision"
by
Crescenzo, Giovanni Di
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
On the decidability of accessibility problems
by
Motwani, Rajeev
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
More general completeness theorems for secure two-party computation
by
Kilian, Joe
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Analysis and design of stream ciphers /
by
Rueppel, Rainer A
Published 1986
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
สเตกาโนกราฟี ศาสตร์แห่งการซ่อนเร้นข้อมูล
by
นิรินธน์ ธานีรัตนื
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
1
2
3
4
5
6
7
8
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Cryptography
Institution
KMUTT
(150)
Library
mai
(28)
zzz
(2)
Format
MONOGRAPHS
(28)
EBOOKS
(2)
Call Number
Q - Science
(57)
T - Technology
(22)
Z - Library Science
(6)
Author
Coppersmith, Don
(3)
Knudsen, Lars R
(3)
Pei, Dingyi
(3)
Stallings, William
(3)
Ferguson, Niels
(2)
more ...
Forouzan, Behrouz A
(2)
Katz, Jonathan
(2)
Kaufman, Charlie
(2)
Oppliger, Rolf
(2)
Shoup, Victor
(2)
Stinson, Douglas R
(2)
สาวิตร์ ตัณฑนุช
(2)
Aiello, William
(1)
Assche, Gilles Van
(1)
Baek, Joonsang
(1)
Ball, W. W. Rouse
(1)
Banerjee, Santo
(1)
Barg, Alexander
(1)
Beaver, Donald
(1)
Bellare, Mihir
(1)
Beutelspacher, Albrecht
(1)
Blackburn, Simon R
(1)
Bleichenbacher, Daniel
(1)
Boyar, Joan
(1)
Bruen, Aiden A
(1)
Burmester, Mike
(1)
Camion, Paul
(1)
Canetti, Ran
(1)
Carlet, Claude
(1)
Cesemlioglu, A
(1)
less ...
Language
English
(143)
Thai
(7)
Genre
Electronic books
(4)
Handbooks, manuals, etc
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website