Search Results
Showing 41 - 50 of 3656 results
Search Results
Lectures on data security
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 L46 1999 | ✔ Available |
Information security
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 L663 1992 | ✔ Available |
Computer security and industrial cryptography
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 C6373 1993 | ✔ Available |
Computer security, ESORICS 98
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 E98 1998 | ✔ Available |
Recent advances in RSA cryptography
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 K38 2001 | ✔ Available |
Modern cryptography, probabilistic proofs, and pseudorandomness
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 G64 1999 | ✔ Available |
Cryptography decrypted
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 M44 2001 | ✔ Available |
The use of passwords for controlled access to computer resources
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.10:500-9 | ✔ Available |