1261. Fault tolerant architectures for cryptography and hardware security. ([2018]) Editors: Patranabis, Sikhar; Mukhopadhyay, Debdeep Record Type: Book Extent: 1 online resource (xii, 240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1262. Proceedings of International Conference on ICT for Sustainable Development : ICT4SD 2015.: ICT4SD 2015. Volume 2 (2016) Editors: Satapathy, Suresh Chandra, 1964-; Joshi, Amit; Modi, Nilesh; Pathak, Nisarg Other Names: International Conference on ICT on Sustainable Development Record Type: Book Extent: 1 online resource (xx, 819 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1263. Proceedings of the First International Conference on Intelligent Computing and Communication. (2016) Editors: Mandal, Jyotsna Kumar; Satapathy, Suresh Chandra; Sanyal, Manas Kumar; Bhateja, Vikrant Record Type: Book Extent: 1 online resource (707 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1264. Proceedings of International Conference on ICT for Sustainable Development : ICT4SD 2015.: ICT4SD 2015. Volume 1 (2016) Editors: Satapathy, Suresh Chandra, 1964-; Joshi, Amit; Modi, Nilesh; Pathak, Nisarg Other Names: International Conference on ICT on Sustainable Development Record Type: Book Extent: 1 online resource (xx, 757 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1265. Advanced computing and systems for security. Volume Three ([2017]) Editors: Chaki, Rituparna; (Computer scientist), Saeed, Khalid; Cortesi, Agostino, 1963-; Chaki, Nabendu Other Names: International Doctoral Symposium on Applied Computation and Security Systems, 3rd Record Type: Book Extent: 1 online resource (xiii, 197 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1266. Big Data Privacy Preservation for Cyber-Physical Systems. (2019) Authors: Pan, Miao; Wang, Jingyi; Errapotu, Sai Mounika; Zhang, Xinyue; Ding, Jiahao; Han, Zhu Record Type: Book Extent: 1 online resource (73 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1267. Mathematical modelling for next-generation cryptography : Crest Crypto-math Project /: Crest Crypto-math Project. (2018) Other Names: Takagi, Tsuyoshi; Wakayama, Masato; Tanaka, Keisuke; Kunihiro, Noboru; Kimoto, Kazufumi; Duong, Dung Hoang Record Type: Book Extent: 1 online resource (363 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1268. IT convergence and security 2017. Volume 2 ([2018]) Editors: Kim, Kuinam J; Kim, Hyuncheol; Baek, Nakhoon Other Names: International Conference on IT Convergence and Security, 7th Record Type: Book Extent: 1 online resource (xvii, 238 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1269. Predictive Computing and Information Security. (2017) Authors: Gupta, P. K; Tyagi, Vipin; Singh, S. K Record Type: Book Extent: 1 online resource (162 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1270. IT convergence and security 2017. Volume 1 ([2018]) Editors: Kim, Kuinam J; Kim, Hyuncheol; Baek, Nakhoon Other Names: International Conference on IT Convergence and Security, 7th Record Type: Book Extent: 1 online resource (xix, 350 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗