Your search for 14979 returns 377 document(s) |
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Complexity Theory and Cryptography: The Random Oracle Methodology, Revisited |
Author: R. Canetti, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 6th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 5th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 4th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing elliptic curve cryptography/Michael Rosing |
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms, and sources code in C |
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|