Results
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contermporary Cryptography by Oppliger, Rolf. Edition: 2nd ed.Material type: Text Publication details: London : Artech House, c2011Availability: Items available for reference: Don Bosco Institute of Technology Library: Not for loan (1)Call number: 652.8 ROL/CON.
|
|
|
|
|
|
|
|
|
Introduction to Identity-Based Encryption Luther Martin. by Martin, Luther. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London : Artech House, c2008Availability: Items available for reference: Don Bosco Institute of Technology Library: Not for loan (1)Call number: 005.82 MAR/INT.
|
|
|
|
|
|
Handbook of Security and Networks Yang Xiao, Frank H Li & Hui Chen. by Xiao, Yang. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London : World Scintific Publishing, c2011Availability: Items available for reference: Don Bosco Institute of Technology Library: Not for loan (1)Call number: 005.8 XIA/HAN.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet of Things Theory and Practice by Tyagi, Amit Kumar. Material type: Text Publication details: London BPB Pub. 2022Availability: Items available for loan: Don Bosco Institute of Technology Library (1)Call number: 004.678 TYA/INT. Items available for reference: Don Bosco Institute of Technology Library: Not for loan (4)Call number: 004.678 TYA/INT, ...
|
|
|
Probabilistic machine learning : an introduction by Murphy, Kevin P. Material type: Text Publication details: London ; MIT Press ; 2022Availability: Items available for reference: Don Bosco Institute of Technology Library: Not for loan (1)Call number: 006.31 MUR/PRO.
|