Cryptography Made Simple
Nigel Smart
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Computer Security and the Internet : Tools and Jewels from Malware to Bitcoin
Paul C. van Oorschot
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Computer Security and the Internet : Tools and Jewels from Malware to Bitcoin
Paul C. van Oorschot
Download - Immediately Available
Format: eBook (PDF)
Protocols for Authentication and Key Establishment
Colin Boyd
Download - Immediately Available
Format: eBook (PDF)
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
Jorg Schwenk
Out of stock
Format: Book (Paperback / softback)
The Complete Guide to SCION : From Design Principles to Formal Verification
Laurent Chuat
Out of stock
Format: Book (Paperback / softback)
The Design of Rijndael : AES - The Advanced Encryption Standard
Joan Daemen
Out of stock
Format: Book (Hardback)
The Theory of Hash Functions and Random Oracles : An Approach to Modern Cryptography
Arno Mittelbach
Out of stock
Format: Book (Hardback)
The Theory of Hash Functions and Random Oracles : An Approach to Modern Cryptography
Arno Mittelbach
Download - Immediately Available
Format: eBook (PDF)
The Theory of Hash Functions and Random Oracles : An Approach to Modern Cryptography
Arno Mittelbach
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£54.99
£50.45
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketNovel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Yan Lin
Out of stock
Format: Book (Paperback / softback)
The Science of Quantitative Information Flow
Mario S. Alvim
Download - Immediately Available
Format: eBook (PDF)
The Complete Guide to SCION : From Design Principles to Formal Verification
Laurent Chuat
Download - Immediately Available
Format: eBook (PDF)
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
Jorg Schwenk
Out of stock
Format: Book (Hardback)
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
Jorg Schwenk
Download - Immediately Available
Format: eBook (PDF)
Modelling and Verification of Secure Exams
Rosario Giustolisi
Out of stock
Format: Book (Paperback / softback)
Computer Security and the Internet : Tools and Jewels
Paul C. van Oorschot
Item not Available
Format: Book (Hardback)
£54.99
£46.15
Item not Available
Book (Hardback)
Computer Security and the Internet : Tools and Jewels
Paul C. van Oorschot
Download - Immediately Available
Format: eBook (PDF)
The LLL Algorithm : Survey and Applications
Phong Q. Nguyen
Item not Available
Format: Book (Hardback)
£149.99
£129.45
Item not Available
Book (Hardback)
The LLL Algorithm : Survey and Applications
Phong Q. Nguyen
Download - Immediately Available
Format: eBook (PDF)
Concurrent Zero-Knowledge : With Additional Background by Oded Goldreich
Alon Rosen
Item not Available
Format: Book (Paperback / softback)
£101.00
£87.99
Item not Available
Book (Paperback / softback)
Efficient Secure Two-Party Protocols : Techniques and Constructions
Carmit Hazay
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Hardback)
£149.99
£144.95
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Hardback)
Add to Basket