Search Results

Refine Results
  1. 1
  2. 2

    Outsourcing information security by Axelrod, C. Warren

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  6. 6

    Security : secrets, intruders and ID tags.

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  7. 7

    Modelling cyber security : approaches, methodology, strategies

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  8. 8

    Identity-based cryptography

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Visual cryptography and secret image sharing

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  14. 14
  15. 15

    Machine learning in image steganalysis by Schaathun, Hans Georg

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Radio frequency identification system security : RFIDsec'12 Asia Workshop proceedings

    Published 2012
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  17. 17

    Secure multi-party computation

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  18. 18
  19. 19

    Cryptography : protocols, design, and applications

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  20. 20

    New directions of modern cryptography by Cao, Zhenfu

    Published 2013
    Full text (MFA users only)
    Electronic eBook