Applied cryptology, cryptographic protocols and computer security models
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
![](/opac-tmpl/bootstrap/itemtypeimg/npl/Rare-Book.gif)
Current library | Home library | Call number | Materials specified | Status | Date due | Barcode |
---|---|---|---|---|---|---|
IMSc Library | IMSc Library | 681.188 AMS (Browse shelf (Opens below)) | Available | 22971 |
Browsing IMSc Library shelves Close shelf browser (Hides shelf browser)
![]() |
No cover image available |
![]() |
No cover image available | No cover image available |
![]() |
No cover image available | ||
681 WAS TCP/IP Running a successful network | 681.03.04 BAL Structural Complexity II | 681.18 RAT Delusions of intelligence | 681.188 AMS Applied cryptology, cryptographic protocols and computer security models | 681.188 BEC Cryptology, Introduction to- | 681.2.06 WOL Clausal Theory of Types | 681.23 CHU Digital computer design fundamentals |
D6,8(B) M533
There are no comments on this title.