Cryptography: Theory and practice by Douglas R Stinson
Material type:
TextSeries: Discrete mathematics and its applicationsPublication details: Boca Raton, Taylor & Francis, 2006.Edition: 3rd editionDescription: 593pISBN: - 9781584885085
- 005.82 STI/C
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;5 (Browse shelf(Opens below)) | Available | 2983 | ||
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;6 (Browse shelf(Opens below)) | Available | 4256 | ||
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;7 (Browse shelf(Opens below)) | Available | 4257 | ||
Reference
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | Cryptography/ Cyber Security | R 005.82 STI/C;8 (Browse shelf(Opens below)) | Not for loan | 4258 | ||
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;9 (Browse shelf(Opens below)) | Available | 4368 | ||
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;10 (Browse shelf(Opens below)) | Available | 4369 | ||
Books
|
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Computer Science | Cryptography/ Cyber Security | 005.82 STI/C;11 (Browse shelf(Opens below)) | Available | 4370 |
Browsing Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre shelves, Shelving location: Computer Science, Collection: Cryptography/ Cyber Security Close shelf browser (Hides shelf browser)
| No cover image available |
|
|
|
|
|
|
||
| 005.82 STA/S Security for ubiquitous computing | 005.82 STA/S Security without obscurity: A guide to cryptographic architectures | 005.82 STI/C;1 Cryptography: Theory and practice | 005.82 STI/C;10 Cryptography: Theory and practice | 005.82 STI/C;11 Cryptography: Theory and practice | 005.82 STI/C;2 Cryptography: Theory and practice | 005.82 STI/C;3 Cryptography: Theory and practice |
There are no comments on this title.
Log in to your account to post a comment.