Search Results for Public key cryptography - Narrowed by: English SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dPublic$002bkey$002bcryptography$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?dt=list 2024-05-01T05:14:18Z Mathematics of public key cryptography ent://SD_ILS/0/SD_ILS:835013 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Galbraith, Steven D., author<br/>Author&#160;Galbraith, Steven D., author<br/>Format:&#160;Books<br/>Call Number&#160;QA268 G35 2012<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781107013926<br/> Primality testing and integer factorization in public-key cryptography ent://SD_ILS/0/SD_ILS:344752 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y364 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387772677<br/> Cryptography and public key infrastructure on the Internet ent://SD_ILS/0/SD_ILS:372272 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Schmeh, Klaus<br/>Author&#160;Schmeh, Klaus<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S33 2003<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847459<br/> Cryptography for Internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:370725 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Galbreath, Nick<br/>Author&#160;Galbreath, Nick<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G34 2002<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471210290<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843414 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S85 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843418 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052054 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:832984 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Chapple, Mike, author<br/>Author&#160;Chapple, Mike, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031591<br/> Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol ent://SD_ILS/0/SD_ILS:811860 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Riaz Ahmad Qamar, 1959- , author<br/>Author&#160;Riaz Ahmad Qamar, 1959- , author,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Subariah Ibrahim, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 R53 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol ent://SD_ILS/0/SD_ILS:811863 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Riaz Ahmad Qamar, 1959-<br/>Author&#160;Riaz Ahmad Qamar, 1959-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031127 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> A practical analysis for dynamic group diffie - hellman key exchange ent://SD_ILS/0/SD_ILS:322168 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Abu Alhayjaa M. Majeed<br/>Author&#160;Abu Alhayjaa M. Majeed,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A28 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Identity-based cryptography ent://SD_ILS/0/SD_ILS:334981 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Joye, Marc, 1969-<br/>Author&#160;Joye, Marc, 1969-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I33 2009<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781586039479<br/> Introduction to identity-based encryption ent://SD_ILS/0/SD_ILS:232288 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Martin, Luther<br/>Author&#160;Martin, Luther<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M377 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932388<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:353804 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2008<br/>Edition&#160;2nd ed.,<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070648234<br/> Applied public key infrastructure : 4th International Workshop : IWAP 2005 ent://SD_ILS/0/SD_ILS:174830 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;International Workshop for Applied PKI (4th : 2005 : Singapore)<br/>Author&#160;International Workshop for Applied PKI (4th : 2005 : Singapore),&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I577 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781586035501<br/> An FPGA implementation of an elliptic curve processor for an embedded public-key cryptosystem ent://SD_ILS/0/SD_ILS:610718 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Lim, Kie Woon<br/>Author&#160;Lim, Kie Woon<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 10863<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/> An FPGA implementation of an elliptic curve processor for an embedded public-key cryptosystem ent://SD_ILS/0/SD_ILS:437969 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Lim, Kie Woon<br/>Author&#160;Lim, Kie Woon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L555 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/> Elliptic curve group over finite field and its application in The Diffie-Hellman key exchange ent://SD_ILS/0/SD_ILS:441418 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Mohd. Rizuan Baharon<br/>Author&#160;Mohd. Rizuan Baharon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M75 2005 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Matematik)) - Universiti Teknologi Malaysia, 2005<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:537235 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Hook, David, 1962-<br/>Author&#160;Hook, David, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H66 2005<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780764596339<br/> Public key crypto hardware for real-time security application ent://SD_ILS/0/SD_ILS:400165 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Mohamed Khalil Mohd. Hani<br/>Author&#160;Mohamed Khalil Mohd. Hani,&#160;Hau, Yuan Wen, 1980-,&#160;Lim, Kie Woon,&#160;National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M54 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Internet security : cryptographic principles, algorithms, and protocols ent://SD_ILS/0/SD_ILS:340235 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Rhee, Man Young<br/>Author&#160;Rhee, Man Young<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 R44 2003<br/>Publisher&#160;J. Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470852859<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:354853 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2003<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780070494831<br/> Public-key crytography ent://SD_ILS/0/SD_ILS:157309 2024-05-01T05:14:18Z 2024-05-01T05:14:18Z by&#160;Salomaa, Arto<br/>Author&#160;Salomaa, Arto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S26 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1996<br/>ISBN&#160;9783540613565<br/>