Your search returned 8 results.

Sort
Results
Trustworthly global computing : 5th international symposium, TGC, Munich, Germany, Feb. 24-26, 2010 (e-book)

by Wirsing, Martin [Editor] | Hofmann, Martin [Editor] | Rauschmayer, Axel [Editor].

Series: Lecture Notes in Computer Science (LNCS) ; v.6084 | LNCS Sublibrary : SL 1 – Theoretical computer science and general issues Language: English Publication details: Berlin Springer 2010Online access: Click here to access online Availability: Items available for reference: Online (1) .

Wiretapped oblivious transfer (R)

by Mishra, Manoj [Author] | Dey, Bikash Kumar [Supervisor] | Prabhakaran, Vinod M [Supervisor] | Indian Institute of Technology Bombay Department of Electrical Engineering.

Language: English Publication details: Bombay ; IIT ; 2016Dissertation note: Thesis Ph.D Indian Institute of Technology Bombay. Department of Electrical Engineering 2016 Availability: Items available for reference: Not for loan (1) Call number: 043:621.391:681.327.8 Mis.

Cryptography and network security : principles and practice

by Stallings, William.

Edition: 7th ed Language: English Publication details: Noida Pearson 2017Availability: Items available for loan: 1 Call number: 621.391:65.012.8 Sta(2).

Symmetric and asymmetric schemes with ideal secrecy and secure transaction over physical channel (R)

by Kammadanam, Vamshi Krishna [Author] | Sule, Virendra [Supervisor] | Hong, Yi [Supervisor] | Indian Institute of Technology Bombay. Department of Electrical Engineering | Monash University, Australia. Department of Electrical and Computer Systems Engineering.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Mumbai IIT 2019Dissertation note: Thesis Ph.D. Indian Institute of Technology Bombay. Department of Electrical Engineering and Monash University, Australia Department of Electrical and Computer Systems Engineering 2019 Availability: Items available for reference: Not for loan (1) Call number: 043:621.391:65.012.8 Kam.

Physically Unclonable Functions (PUFs) : applications, models, and future directions (e-book)

by Wachsmann, Christian [Author] | Sadeghi, Ahmad-Reza [Editor].

Series: Synthesis lectures on information security, privacy, and trustMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: San Rafael Morgan and Claypool / IEEE Press / Springer 2014Online access: Click here to access online Availability: Items available for reference: Online (1) .

Word association thematic analysis : a social media text exploration strategy (e-book)

by Thelwall, Mike [Author].

Series: Synthesis lectures on information concepts, retrieval, and servicesMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: San Rafael Morgan and Claypool / IEEE Press / Springer 2021Online access: Click here to access online Availability: Items available for reference: Online (1) .

Privacy risk analysis of online social networks (e-book)

by De, Sourya Joyee [Author] | Imine, Abdessamad [Author].

Series: Synthesis lectures on information security, privacy, and trustMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: San Rafael Morgan and Claypool / IEEE Press / Springer 2021Online access: Click here to access online Availability: Items available for reference: Online (1) .

Implementing cybersecurity : a guide to the national institute of standards and technology Risk management framework

by Kohnke, Anne [Author] | Shoemaker, Dan [Author].

Series: Internal audit and IT audit seriesEdition: Indian ed. Language: English Publication details: Boca Raton CRC Press 2017Availability: Items available for loan: 1 Call number: 681.3:65.012.8 Koh.

Pages

Powered by Koha