Search Results for Cryptography - Narrowed by: Cryptography - Open Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-11T09:36:16Z Contemporary cryptography ent://SD_ILS/0/SD_ILS:799372 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781608071456<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:454299 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580536424<br/> Practical cryptography ent://SD_ILS/0/SD_ILS:371526 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Ferguson, Niels<br/>Author&#160;Ferguson, Niels,&#160;Schneier, Bruce, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F474 2003<br/>Publisher&#160;Wiley ,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780471228943&#160;9780471223573<br/> Cryptography decrypted ent://SD_ILS/0/SD_ILS:394200 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mel, H. X., 1948-<br/>Author&#160;Mel, H. X., 1948-,&#160;Baker, Doris M., 1953-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M44 2001<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780201616477<br/> Broadband quantum cryptography ent://SD_ILS/0/SD_ILS:764760 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Rogers, Daniel J.<br/>Author&#160;Rogers, Daniel J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R64 2010<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781608450596<br/> Cryptography research perspectives ent://SD_ILS/0/SD_ILS:642541 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Chen, Roland E.<br/>Author&#160;Chen, Roland E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C833 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781604564921<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:170967 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;St. Denis, Tom<br/>Author&#160;St. Denis, Tom,&#160;Johnson, Simon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S725 2007<br/>Publisher&#160;Syngrees Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491044<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:152707 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Buchmann, Johannes A.<br/>Author&#160;Buchmann, Johannes A.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 B82 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780387207568<br/> Cryptography: an introduction ent://SD_ILS/0/SD_ILS:345509 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Smart, Nigel<br/>Author&#160;Smart, Nigel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S62 2003<br/>Publisher&#160;McGraw-Hill Education ,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780077099879<br/> Cryptography : an introduction ent://SD_ILS/0/SD_ILS:756035 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Yaschenko V. V.<br/>Author&#160;Yaschenko V. V.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 V85 2002<br/>Series Title&#160;Student mathematical library, 1520-9121 ; v. 18<br/>Publisher&#160;American Mathematical Society,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780821829868<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:284442 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Katz, Jonathan, 1974-<br/>Author&#160;Katz, Jonathan, 1974-,&#160;Lindell, Yehuda<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K37 2008<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584885511<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Cryptography : Infosec pro guide ent://SD_ILS/0/SD_ILS:807371 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 O75 2013<br/>Publisher&#160;McGraw-Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071794251<br/> Cryptography and information security ent://SD_ILS/0/SD_ILS:316537 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Pachghare, V. K.<br/>Author&#160;Pachghare, V. K.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P32 2009<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2009<br/>ISBN&#160;9788120335219<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:195334 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K664 2007<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471947837<br/> Cryptography : theory and practice ent://SD_ILS/0/SD_ILS:143227 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Stinson, Douglas R. (Douglas Robert), 1956-<br/>Author&#160;Stinson, Douglas R. (Douglas Robert), 1956-<br/>Format:&#160;Books<br/>Call Number&#160;QA268 S74 2006<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584885085<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:490877 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Sergienko, Alexander V.<br/>Author&#160;Sergienko, Alexander V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 Q36 2005<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849336843<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:537235 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Hook, David, 1962-<br/>Author&#160;Hook, David, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H66 2005<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780764596339<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:395529 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Young, Adam, 1972-<br/>Author&#160;Young, Adam, 1972-,&#160;Yung, Moti<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9 .A25 Y68 2004<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764549755<br/> Cryptography and secure communications ent://SD_ILS/0/SD_ILS:299072 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Man, Young Rhee<br/>Author&#160;Man, Young Rhee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R43 1994<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780071125024<br/> Number theory and cryptography ent://SD_ILS/0/SD_ILS:259807 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Loxton, J. H.<br/>Author&#160;Loxton, J. H.<br/>Format:&#160;Books<br/>Call Number&#160;QA241 N95 1990<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780521398770<br/> Cryptolib: cryptography in software ent://SD_ILS/0/SD_ILS:415709 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Lacy, John B.<br/>Author&#160;Lacy, John B.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5972<br/> Cryptography and data security ent://SD_ILS/0/SD_ILS:296031 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Denning, Dorothy Elizabeth Robling<br/>Author&#160;Denning, Dorothy Elizabeth Robling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D46 1982<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1983&#160;1982<br/>ISBN&#160;9780201101508<br/> Introduction to cryptography : principles and applications ent://SD_ILS/0/SD_ILS:164219 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Delfs, Hans<br/>Author&#160;Delfs, Hans,&#160;Knebl, Helmut<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D44 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:834546 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Kraft, James S.<br/>Author&#160;Kraft, James S.,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA241 K73 2014<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781482214413<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:829247 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Welschenbach, Michael, author<br/>Author&#160;Welschenbach, Michael, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781430250982<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:837292 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Cao, Zhenfu, author<br/>Author&#160;Cao, Zhenfu, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C36 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501386<br/> Introduction to cryptography and network security ent://SD_ILS/0/SD_ILS:155877 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Forouzan, Behrouz A.<br/>Author&#160;Forouzan, Behrouz A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F67 2008<br/>Publisher&#160;McGraw-Hill Higher Education,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780073327532<br/> Quantum cryptography and secret-key distillation ent://SD_ILS/0/SD_ILS:134938 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Van Assche, Gilles<br/>Author&#160;Van Assche, Gilles<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V36 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521864855<br/> Complexity and cryptography : an introduction ent://SD_ILS/0/SD_ILS:390976 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Talbot, John<br/>Author&#160;Talbot, John,&#160;Welsh, D. J. A<br/>Format:&#160;Books<br/>Call Number&#160;Z103 T35 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521852319<br/> Introduction to cryptography : with coding theory ent://SD_ILS/0/SD_ILS:326112 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Trappe, Wade<br/>Author&#160;Trappe, Wade,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T73 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131981997&#160;9780131862395<br/> Modern cryptography : theory and practice ent://SD_ILS/0/SD_ILS:156314 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mao, Wenbo<br/>Author&#160;Mao, Wenbo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M36 2004<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780130669438<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:437144 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B87 2004<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254952<br/> Introduction to cryptography with Java applets ent://SD_ILS/0/SD_ILS:419277 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Bishop, David, 1963-<br/>Author&#160;Bishop, David, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B57 2003<br/>Publisher&#160;Jones and Bartlett,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780763722074<br/> Introduction to cryptography : with coding theory ent://SD_ILS/0/SD_ILS:358964 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Trappe, Wade<br/>Author&#160;Trappe, Wade,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T73 2002<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130618146<br/> Coding theory and cryptography : the essentials ent://SD_ILS/0/SD_ILS:398310 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Hankerson, Darrel R.<br/>Author&#160;Hankerson, Darrel R.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 C62 2000<br/>Edition&#160;2nd ed., rev. and expanded<br/>Publisher&#160;Marcel Dekker,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780824704650<br/> Cryptography : an introduction to computer security ent://SD_ILS/0/SD_ILS:442385 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Seberry, Jennifer<br/>Author&#160;Seberry, Jennifer,&#160;Pieprzyk, Josef<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S37 1989<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780724802746&#160;9780131949867<br/> Machine cryptography and modern cryptanalysis ent://SD_ILS/0/SD_ILS:327081 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Deavours, Cipher A.<br/>Author&#160;Deavours, Cipher A.,&#160;Kruh, Louis<br/>Format:&#160;Books<br/>Call Number&#160;Z103.D42 1985<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780890061619<br/> Quantum cryptography and computing : theory and implementation ent://SD_ILS/0/SD_ILS:812825 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Horodecki, Ryszard<br/>Author&#160;Horodecki, Ryszard,&#160;Kilin, Sergei Ya,&#160;Mowalik, Janusz<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 Q366 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607505464<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Understanding and applying cryptography and data security ent://SD_ILS/0/SD_ILS:337579 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Elbirt, Adam J.<br/>Author&#160;Elbirt, Adam J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E43 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420061604<br/> Topics in geometry, coding theory and cryptography ent://SD_ILS/0/SD_ILS:171381 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Garcia, Arnaldo<br/>Author&#160;Garcia, Arnaldo,&#160;Stichtenoth, H., (Henning), 1944-<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T66 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781402053337&#160;9781402053344<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">View Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:288506 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Sklavos, Nicolas<br/>Author&#160;Sklavos, Nicolas,&#160;Zhang, Xinmiao<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W64 2007<br/>Publisher&#160;CRC Pr.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849387715<br/> Java cryptography extensions : practical guide for programmers ent://SD_ILS/0/SD_ILS:397443 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Weiss, Jason<br/>Author&#160;Weiss, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.J38 W444 2004<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780127427515<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:814026 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Rass, Stefan<br/>Author&#160;Rass, Stefan,&#160;Slamanig, Daniel, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R37 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608075751<br/> Chaos synchronization and cryptography for secure communications : applications for encryption ent://SD_ILS/0/SD_ILS:630454 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Banerjee, Santo, 1976-<br/>Author&#160;Banerjee, Santo, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C43 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615207374&#160;9781615207381<br/> Primality testing and integer factorization in public-key cryptography ent://SD_ILS/0/SD_ILS:344752 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y364 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387772677<br/> Cryptography in the database : the last line of defense ent://SD_ILS/0/SD_ILS:465219 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Kenan, Kevin<br/>Author&#160;Kenan, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 K45 2006<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321320735<br/> A classical introduction to cryptography : applications for communications security ent://SD_ILS/0/SD_ILS:94421 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Vaudenay, Serge<br/>Author&#160;Vaudenay, Serge<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V38 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387254647<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:424781 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Bruen, Aiden A., 1941-<br/>Author&#160;Bruen, Aiden A., 1941-,&#160;Forcinito, Mario, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9.A25 B79 2005<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780471653172<br/> Cryptography and public key infrastructure on the Internet ent://SD_ILS/0/SD_ILS:372272 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Schmeh, Klaus<br/>Author&#160;Schmeh, Klaus<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S33 2003<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847459<br/> Cryptography for Internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:370725 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Galbreath, Nick<br/>Author&#160;Galbreath, Nick<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G34 2002<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471210290<br/> Cryptography and e-commerce : a Wiley tech brief ent://SD_ILS/0/SD_ILS:371601 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Graff, Jon C.<br/>Author&#160;Graff, Jon C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G72 2001<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780471405740<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:452822 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Schneier, Bruce, 1963-<br/>Author&#160;Schneier, Bruce, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S36 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471117094<br/> The application of cryptography for data base security ent://SD_ILS/0/SD_ILS:640651 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Gudes, Ehud<br/>Author&#160;Gudes, Ehud,&#160;Koch, Harvey S.,&#160;Stahl, Fred A.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 16855<br/>Publication Date&#160;1976<br/> Concurrent zero knowledge ent://SD_ILS/0/SD_ILS:94672 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Rosen, Alon<br/>Author&#160;Rosen, Alon,&#160;Goldreich, Oded<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R674 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540329381<br/> CRYPTOLOGY : Classical and Modern ent://SD_ILS/0/SD_ILS:882329 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Klima, Richard E., author<br/>Author&#160;Klima, Richard E., author,&#160;Sigmon, Neil, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 K55 2019<br/>Edition&#160;Second Edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138047624<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Algebraic geometry modeling in information theory ent://SD_ILS/0/SD_ILS:801380 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mart&iacute;nez-Moro, Edgar<br/>Author&#160;Mart&iacute;nez-Moro, Edgar<br/>Format:&#160;Books<br/>Call Number&#160;QA268 A44 2013<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2013<br/>ISBN&#160;9789814335751<br/> Advanced linear cryptanalysis of block and stream ciphers ent://SD_ILS/0/SD_ILS:796013 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Junod, Pascal, 1976-<br/>Author&#160;Junod, Pascal, 1976-,&#160;Canteaut, Anne<br/>Format:&#160;Books<br/>Call Number&#160;Z103 A38 2011<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781607508434<br/> Hacking miracles : the true strories of inventors and cyberspace pioneer such as Alexander Bell, Thomas Edison, Steve Jobs, Bill Gates and others ent://SD_ILS/0/SD_ILS:816673 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Gubitosa, Carlo<br/>Author&#160;Gubitosa, Carlo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 G83 2011<br/>Publisher&#160;Jaico Publishing House,<br/>Publication Date&#160;2011<br/>ISBN&#160;9788184952018<br/> Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:758794 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Heiderich, Mario<br/>Author&#160;Heiderich, Mario<br/>Format:&#160;Books<br/>Call Number&#160;QA76.625 H46 2011<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496049<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:639636 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.H36 K65 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470344736<br/> Expert SQL server 2008 encryption ent://SD_ILS/0/SD_ILS:640718 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Coles, Michael, 1972-<br/>Author&#160;Coles, Michael, 1972-,&#160;Landrum, Rodney<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C653 2009<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781430224648&#160;9781430224655<br/> Information theory, coding and crytography ent://SD_ILS/0/SD_ILS:389378 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Bose, Ranjan<br/>Author&#160;Bose, Ranjan<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.92 B67 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Tata McGraw Hill Education Private Limited,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070669017<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:287325 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Swenson, Christopher<br/>Author&#160;Swenson, Christopher<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S932 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470135938<br/> Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers ent://SD_ILS/0/SD_ILS:330155 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Morsch, Oliver<br/>Author&#160;Morsch, Oliver<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 M67 2008<br/>Publisher&#160;Wiley-VCH,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783527407101<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:155893 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark,&#160;Low, Richard M., 1967-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S68 2007<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470114865<br/> Decrypted secrets : methods and maxims of cryptology ent://SD_ILS/0/SD_ILS:158035 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Bauer, Friedrich Ludwig, 1924-<br/>Author&#160;Bauer, Friedrich Ludwig, 1924-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B38 2007<br/>Edition&#160;4th, rev. and extended ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/> Finite fields and applications ent://SD_ILS/0/SD_ILS:320540 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mullen, Gary L.<br/>Author&#160;Mullen, Gary L.,&#160;Mummert, Carl, 1978-<br/>Format:&#160;Books<br/>Call Number&#160;QA247.3 M85 2007<br/>Publisher&#160;American Mathematical Society,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780821844182<br/> Cryptographic algorithms on reconfigurable hardware ent://SD_ILS/0/SD_ILS:158018 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Rodriquez-Henriquez, Francisco<br/>Author&#160;Rodriquez-Henriquez, Francisco<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A3 C79 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387338835<br/> Provider independent cryptographic tools ent://SD_ILS/0/SD_ILS:373731 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S8337 2006 af<br/>Publisher&#160;Penerbit UTM,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789673531097<br/> Cryptographic libraries for developers ent://SD_ILS/0/SD_ILS:454419 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Moyle, Ed, 1973-<br/>Author&#160;Moyle, Ed, 1973-,&#160;Kelley, Diana, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 M79 2006<br/>Edition&#160;1st ed.<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584504092<br/> Practical cryptology and Web security ent://SD_ILS/0/SD_ILS:470477 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Yuen, P.K.<br/>Author&#160;Yuen, P.K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 Y83 2006<br/>Publisher&#160;Pearson Education LTD,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321263339<br/> Cryptanalysis in cryptographic algorithm design ent://SD_ILS/0/SD_ILS:461476 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Muhammad Reza Z'aba<br/>Author&#160;Muhammad Reza Z'aba,&#160;Badrisham Ahmad,&#160;Subariah Ibrahim,&#160;Mohd. Aizaini Maarof,&#160;National ICT Conference (2006 : Perlis)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C794<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Authentification codes and combinatorial designs ent://SD_ILS/0/SD_ILS:143222 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Pei, Dingyi<br/>Author&#160;Pei, Dingyi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P446 2006<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584864738&#160;9781584884736<br/> Classical and contemporary cryptology ent://SD_ILS/0/SD_ILS:443418 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Spillman, Richard J.<br/>Author&#160;Spillman, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 S64 2005<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780131828315<br/> Analysis of image quality for steganographic software ent://SD_ILS/0/SD_ILS:454770 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Azizah Abd. Manaf, Prof. Dr.<br/>Author&#160;Azizah Abd. Manaf, Prof. Dr.,&#160;M. Z. Akram,&#160;K. Salehuddin,&#160;Sayuthi Jaafar,&#160;Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A53 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:419291 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang,&#160;Huang, Hsiang-Cheh,&#160;Jain, Lakhmi C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I574 2004<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2004<br/>ISBN&#160;9789812389558&#160;9789812387578<br/> Public key crypto hardware for real-time security application ent://SD_ILS/0/SD_ILS:400165 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mohamed Khalil Mohd. Hani<br/>Author&#160;Mohamed Khalil Mohd. Hani,&#160;Hau, Yuan Wen, 1980-,&#160;Lim, Kie Woon,&#160;National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M54 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Information security intelligence : cryptographic principles and applications ent://SD_ILS/0/SD_ILS:420147 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Calabrese, Thomas<br/>Author&#160;Calabrese, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C344 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781401837273<br/> Cryptanalysis of number theoretic ciphers ent://SD_ILS/0/SD_ILS:374663 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Wagstaff Jr., Samuel S.<br/>Author&#160;Wagstaff Jr., Samuel S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W33 2003<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781584881537<br/> System-on-chip architectures and implementations for private-key data encryption ent://SD_ILS/0/SD_ILS:409391 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;McLoone, Maire<br/>Author&#160;McLoone, Maire,&#160;McCanny, J. V.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M564 2003<br/>Publisher&#160;Kluwer Academic/Plenum Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780306478826<br/> Asas kriptografi ent://SD_ILS/0/SD_ILS:351624 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;Rabiah Ahmad, Dr.<br/>Format:&#160;Books<br/>Call Number&#160;Z103 M34 2003<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>ISBN&#160;9789835203138<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Secure E-voting with blind signature ent://SD_ILS/0/SD_ILS:327456 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Maznah Kamat, 1960-,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S424 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Coding theory and cryptology ent://SD_ILS/0/SD_ILS:363827 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Niederreiter, Harald<br/>Author&#160;Niederreiter, Harald<br/>Format:&#160;Books<br/>Call Number&#160;QA268 C66 2002<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2002<br/>ISBN&#160;9789812381323<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Auditors' introduction to crytography and its application in database security ent://SD_ILS/0/SD_ILS:345848 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Cryptographic applications in database security : a survey study ent://SD_ILS/0/SD_ILS:326720 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Piper, Fred,&#160;Norbik Bashah Idris,&#160;Ciechanowicz, Zbigniew 'Chez',&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z344 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> A generalized group signature scheme ent://SD_ILS/0/SD_ILS:301239 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Eddie Shahril Ismail<br/>Author&#160;Eddie Shahril Ismail,&#160;Yahya Abu Hasan, 1953-,&#160;How, Guan Aun<br/>Format:&#160;Books<br/>Call Number&#160;QA268 E33 2001<br/>Publisher&#160;Universiti Sains Malaysia,<br/>Publication Date&#160;2001<br/> The multiple RSA cryptosystem ent://SD_ILS/0/SD_ILS:301269 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;How, Guan Aun<br/>Author&#160;How, Guan Aun,&#160;Yahya Abu Bakar,&#160;Eddie Shahril Ismail<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 2001<br/>Publisher&#160;Universiti Sains Malaysia,<br/>Publication Date&#160;2001<br/> Rijndael : comparison with other symmetric-key ciphers ent://SD_ILS/0/SD_ILS:301631 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R54 2001<br/>Publisher&#160;UNITEN,<br/>Publication Date&#160;2001<br/> Satu skema tandatangan buta digital ent://SD_ILS/0/SD_ILS:330477 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Eddie Shahril Ismail<br/>Author&#160;Eddie Shahril Ismail,&#160;How, Guan Aun,&#160;Yahya Abu Hasan, 1953-,&#160;Universiti Sains Malaysia. Pusat Pengajian Sains Matematik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E32 2001<br/>Publisher&#160;Universiti Sains Malaysia,<br/>Publication Date&#160;2001<br/> Decrypted secrets : methods and maxims of cryptology ent://SD_ILS/0/SD_ILS:157291 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Bauer, Friedrich Ludwig<br/>Author&#160;Bauer, Friedrich Ludwig<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B38 2000<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2000<br/>ISBN&#160;9783540668718<br/> A traceable proactive anonymous electronic cash ent://SD_ILS/0/SD_ILS:139538 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Security control and analysis system ent://SD_ILS/0/SD_ILS:481610 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Norbik Bashah Idris<br/>Author&#160;Norbik Bashah Idris,&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Nik Khairul Raja Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;MAK 12825 a<br/>Publication Date&#160;2000<br/> Cryptographic protocol for payment transaction ent://SD_ILS/0/SD_ILS:136182 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;TENCON '2000 (2000 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Public-key crytography ent://SD_ILS/0/SD_ILS:157309 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Salomaa, Arto<br/>Author&#160;Salomaa, Arto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S26 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1996<br/>ISBN&#160;9783540613565<br/> Building in big brother : the crytographic policy debate ent://SD_ILS/0/SD_ILS:157400 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Hoffman, Lance J.<br/>Author&#160;Hoffman, Lance J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B85 1995<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1995<br/>ISBN&#160;9780387944418<br/> Analysis of modified improved geffe random sequence generator ent://SD_ILS/0/SD_ILS:404971 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Ahmad Zuri Sha'ameri<br/>Author&#160;Ahmad Zuri Sha'ameri,&#160;Tuan Sabri Tuan Mat,&#160;Kamaruzzaman Seman,&#160;International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11944 a<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/> Cryptology ent://SD_ILS/0/SD_ILS:410559 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Beutelspacher, Albrecht<br/>Author&#160;Beutelspacher, Albrecht,&#160;Fisher, J. Chris<br/>Format:&#160;Books<br/>Call Number&#160;Z103 B48 1994<br/>Publisher&#160;Mathematical Association of America,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780883855041<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:410085 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Simmons, Gustavus J.<br/>Author&#160;Simmons, Gustavus J.,&#160;Institute of Electrical and Electronics Engineers<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C64 1992<br/>Publisher&#160;IEEE Press,<br/>Publication Date&#160;1992<br/>ISBN&#160;9780879422776<br/> Cryptology : machines, history and methods ent://SD_ILS/0/SD_ILS:194261 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Deavours, Cipher A.<br/>Author&#160;Deavours, Cipher A.<br/>Format:&#160;Books<br/>Call Number&#160;Z103 C79 1989<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780890063996<br/> Modern cryptology : a tutorial ent://SD_ILS/0/SD_ILS:182755 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Brassard, Gilles<br/>Author&#160;Brassard, Gilles<br/>Format:&#160;Books<br/>Call Number&#160;Z103.B72 1988<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780387968421<br/> Cipher systems : the protection of communications ent://SD_ILS/0/SD_ILS:157552 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Beker, Henry<br/>Author&#160;Beker, Henry,&#160;Piper, Fred<br/>Format:&#160;Books<br/>Call Number&#160;Z104.B44 1982<br/>Publisher&#160;Northwood Bks,<br/>Publication Date&#160;1982<br/>ISBN&#160;9780442306076<br/> Tutorial : the security of data in networks ent://SD_ILS/0/SD_ILS:254409 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 D36 1981 f<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1981<br/> Mathematical recreations and essays ent://SD_ILS/0/SD_ILS:295849 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925,&#160;Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format:&#160;Books<br/>Call Number&#160;QA95.B3 1974<br/>Edition&#160;12th ed.<br/>Publisher&#160;University of Toronto Press,<br/>Publication Date&#160;1974<br/>ISBN&#160;9780802018441<br/> Mathematical recreations &amp; essays ent://SD_ILS/0/SD_ILS:295753 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925,&#160;Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format:&#160;Books<br/>Call Number&#160;QA95 B3 1947<br/>Edition&#160;American ed.<br/>Publisher&#160;Macmillan Co.,<br/>Publication Date&#160;1947<br/> Mathematical recreations and essays ent://SD_ILS/0/SD_ILS:296625 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Format:&#160;Books<br/>Call Number&#160;QA95.B3 1939<br/>Edition&#160;11th ed.<br/>Publisher&#160;Macmillan,<br/>Publication Date&#160;1939<br/> Information leakage of boolean fuctions and its relationship to other cryptographic criteria ent://SD_ILS/0/SD_ILS:411795 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Zhang, M.<br/>Author&#160;Zhang, M.,&#160;Tavares, S. E.,&#160;Campbell, L. L.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5975<br/> Cryptographic relational algebra ent://SD_ILS/0/SD_ILS:417641 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Davida, George I.<br/>Author&#160;Davida, George I.,&#160;Yeh, I.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5978<br/> Stream ciphers for high speed data transmission ent://SD_ILS/0/SD_ILS:404253 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Tuan Sabri Tuan Mat<br/>Author&#160;Tuan Sabri Tuan Mat,&#160;Ahmad Zuri Sha'ameri,&#160;Malaysian Science and Technology Congress (1994 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 12011 a<br/> Hacking the Hacker: Learn From the Experts Who Take Down Hackers ent://SD_ILS/0/SD_ILS:872613 2024-06-11T09:36:16Z 2024-06-11T09:36:16Z by&#160;Grimes, Roger A.<br/>Author&#160;Grimes, Roger A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G75 2017<br/>ISBN&#160;9781119396215<br/>