Search Results for - Narrowed by: R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Cryptography. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300? 2024-05-30T17:26:35Z Group theoretic cryptography ent://SD_ILS/0/SD_ILS:2306763 2024-05-30T17:26:35Z 2024-05-30T17:26:35Z by&#160;Gonz&aacute;lez Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-05-30T17:26:35Z 2024-05-30T17:26:35Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding, steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2287580 2024-05-30T17:26:35Z 2024-05-30T17:26:35Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2280752 2024-05-30T17:26:35Z 2024-05-30T17:26:35Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9781558607699/?ar">https://learning.oreilly.com/library/view/~/9781558607699/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar">https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Modelling and Analysis of Security Protocols: the CSP Approach ent://SD_ILS/0/SD_ILS:2326682 2024-05-30T17:26:35Z 2024-05-30T17:26:35Z by&#160;Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format:&#160;Electronic Resources<br/>