Introduction to Identity-Based Encryption Luther Martin.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
Don Bosco Institute of Technology Library Reference | Computer Science | 005.82 MAR/INT (Browse shelf(Opens below)) | Not for loan | 12871 |
Browsing Don Bosco Institute of Technology Library shelves, Shelving location: Reference, Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 SKO/COU Counter Hack Reloaded A step-by-step guide to computer attacks and effective Defenses | 005.8 XIA/HAN Handbook of Security and Networks | 005.82 GOL/FOU Foundations of Cryptography: Basic Tools/ | 005.82 MAR/INT Introduction to Identity-Based Encryption | 005.82 MEN/HAN Handbook of Applied Cryptography | 005.82 TRI/CRY Cryptography And Network Security | 006.3 APR/FRA Parallel and Distributed Computational Intelligence: Studies in Computational Intelligence 269/ |
There are no comments on this title.