10 books • 2 series
Introduction to Cryptography with Coding Theory [rental Edition]
Pearson eText Introduction to Cryptography -- Instant Access
Pervasive Wireless Environments
Pervasive Wireless Environments: Detecting and Localizing User Spoofing (SpringerBriefs in Computer Science)
Securing Emerging Wireless Systems
Network-Aware Security for Group Communications
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing & Communications)
Instructor's Solutions Manual (Download only) for Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory
Multimedia Fingerprinting Forensics for Traitor Tracing. Eurasip Book Series on Signal Processing and Communications, Volume 4. (EURASIP Book Series on Signal Processing & Communications)