by Bruce Schneier , Michael T. Goodrich , Roberto Tamassia
No reviews yet. Be the first!
Applied Cryptography
Liars and Outliers
Secrets and Lies
Hacker's Mind
Security Savvy
We Have Root
Financial Cryptography and Data Security
Information Security
Cryptology
Quantum Information Theory
Distributed Networks
Visual cryptography and secret image sha...