Title: A Student's Guide to Coding and Information Theory, Author: Stefan M. Moser
Title: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 / Edition 1, Author: Josef Pawel Pieprzyk
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Applied Quantum Cryptography / Edition 1, Author: Christian Kollmitzer
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet, Author: R. F. Churchhouse
Title: Coding for Wireless Channels / Edition 1, Author: Ezio Biglieri
Title: Communication Theory, Author: Charles M. Goldie
Title: Cryptography in C and C++ / Edition 2, Author: Michael Welschenbach
Title: Decrypting the Encryption Debate: A Framework for Decision Makers, Author: National Academies of Sciences
Title: Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / Edition 1, Author: Ulrich Flegel
Title: Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers / Edition 1, Author: Kaisa Nyberg
Title: Fibonacci Numbers / Edition 1, Author: Nicolai N. Vorobiev
Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Graphs, Codes and Designs, Author: P. J. Cameron
Title: Guide to Elliptic Curve Cryptography / Edition 1, Author: Darrel Hankerson
Title: Innovations in Digital Watermarking Techniques / Edition 1, Author: Feng-Hsing Wang
Title: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings / Edition 1, Author: Christopher C. Yang
Title: Journal of Cyber Security and Mobility (5-3), Author: Ashutosh Dutta
Title: Kish Cypher, The: The Story Of Kljn For Unconditional Security, Author: Laszlo B Kish

Pagination Links