Branch at CLC of the IST Library - Tagus
(by reverse order of acquisition)

References

[1]
S. Vanstone A. Menezes, P. Oorschot. Handbook of Applied Cryptography. CRC Press, 1997.
[2]
D. Stinson. Cryptography - Theory and Practice, 3rd Edition. Chapman & Hall/CRC, 2006.
[3]
C. Kaufman, R. Perlman, and M. Speciner. Network Security - Private Communication in a Public World, 2nd Edition. Prentice-Hall, 2002.
[4]
W. Stallings. Cryptography and Network Security -Principles and Practice, 4th Edition. Prentice-Hall, 2006.
[5]
A. Tanenbaum. Computer Networks - 4th Edition. Prentice-Hall, 2003.
[6]
R. Milner. Communicating and Mobile Systems: the p-calculus. Cambridge University Press, 1999.
[7]
W. Mao. Modern Cryptography - Theory and Practice. Prentice-Hall, 2004.
[8]
O. Goldreich. Foundations of Cryptography - Volume 2. Cambridge University Press, 2004.
[9]
D. Sangiorgi and D. Walker. The p-calculus: a Theory of Mobile Processes. Cambridge University Press, 2001.
[10]
M. Bishop. Computer Security: Art and Science. Addison-Wesley, 2003.
[11]
D. Denning. Information Warfare and Security. Addison-Wesley, 1999.



File translated from TEX by TTH, version 3.80.
On 31 Jul 2008, 12:08.