Please use this identifier to cite or link to this item: http://macl-ustm.digitallibrary.co.in/handle/123456789/4463
Full metadata record
DC FieldValueLanguage
dc.contributor.authorStinson, Douglas R.-
dc.contributor.authorPaterson, Maura B.-
dc.date.accessioned2023-03-25T03:39:52Z-
dc.date.available2023-03-25T03:39:52Z-
dc.date.issued2019-03-15-
dc.identifier.citationhttp://macl-ustm.digitallibrary.co.in/handle/123456789/761en_US
dc.identifier.issn9780367148591-
dc.identifier.urihttp://macl-ustm.digitallibrary.co.in/handle/123456789/4463-
dc.publisherCRC Pressen_US
dc.subjectComputer Scienceen_US
dc.subjectCryptography Theory and Practiceen_US
dc.titleCryptography Theory and Practiceen_US
dc.typeBooken_US
Appears in Collections:Department of Computer Science

Files in This Item:
File Description SizeFormat 
Cryptography Theory and Practice (1-5).pdf
  Restricted Access
page (1-5)2.29 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (6-10).pdf
  Restricted Access
page (6-10)2.9 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (11-14).pdf
  Restricted Access
page (11-14)1.8 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (15-19).pdf
  Restricted Access
page (15-19)2.09 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (20-24).pdf
  Restricted Access
page (20-24)2.07 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (25-29).pdf
  Restricted Access
page (25-29)1.9 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (30-34).pdf
  Restricted Access
page (30-34)1.94 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (35-39).pdf
  Restricted Access
page (35-39)1.98 MBAdobe PDFView/Open Request a copy
Cryptography Theory and Practice (40-43).pdf
  Restricted Access
page (40-43)1.57 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.