1. Visual cryptography and secret image sharing. (©2012) Other Names: Cimato, Stelvio; Yang, Ching-Nung Record Type: Book Extent: 1 online resource (xxxvi, 501 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cryptographic and information security : approaches for images and videos /: approaches for images and videos. (2018) Authors: Ramakrishnan, S Editors: (College teacher), Ramakrishnan, S Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Introduction to cryptography with open-source software. (©2011) Other Names: McAndrew, Alasdair Record Type: Book Extent: 1 online resource (xix, 433 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Multimedia content encryption : techniques and applications /: techniques and applications. (©2009) Other Names: Lian, Shiguo Record Type: Book Extent: 1 online resource (xvii, 217 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Circuits and systems for security and privacy. (2016) Editors: Sheikh, Farhana; Sousa, Leonel A (Leonel Augusto); Iniewski, Krzysztof, 1960- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Image encryption : a communication perspective /: a communication perspective. ([2014]) Authors: Abd el-Samie, Fathi E; Ahmed, Hossam Eldin H; Elashry, Ibrahim F; Shahieen, Mai H; Faragallah, Osama S; El-Rabaie, El-Sayed M; Alshebeili, Saleh A Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Security for wireless sensor networks using identity-based cryptography. (©2013) Other Names: Patil, Harsh Kupwade; Szygenda, Stephen A Record Type: Book Extent: 1 online resource (xix, 204 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Handbook of financial cryptography and security. (©2011) Other Names: Rosenberg, Burton Record Type: Book Extent: 1 online resource (xxvi, 605 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. RC4 stream cipher and its variants. (©2012) Other Names: Paul, Goutam; Maitra, Subhamoy, 1970- Record Type: Book Extent: 1 online resource (xxv, 285 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Secure searchable encryption and data management. (2021) Authors: Gupta, Brij, 1982-; Mamta Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗