| Parent Directory/ | | - | Directory |
| (eBook) - Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf | 2006-Dec-28 06:47:46 | 392.2K | application/pdf |
| Applied Cryptology.Cryptographic Protocols.Computer Security Models.pdf | 2006-Dec-28 06:47:48 | 6.4M | application/pdf |
| Cambridge University Press - Advances In Elliptic Curve Cryptography (2005).pdf | 2006-Dec-28 06:47:49 | 4.6M | application/pdf |
| Computer Science - Data Mining Tutorial.pdf | 2006-Dec-28 06:47:41 | 2.8M | application/pdf |
| Computer Science - Mit Press - Principles Of Data Mining.pdf | 2006-Dec-28 06:47:37 | 3.7M | application/pdf |
| Cryptographic Security Architecture Design and Verification (2004).pdf | 2006-Dec-28 06:47:39 | 2.7M | application/pdf |
| Data Mining, Practical Machine Learning Tools and Techniques 2nd.Ed (Morgan Kaufmann 2005)WEKA.pdf | 2006-Dec-28 06:47:51 | 7.7M | application/pdf |
| Practical Cryptography.pdf | 2006-Dec-28 06:47:46 | 614.2K | application/pdf |
| Prentice Hall - Modern Cryptography - Theory and Practice - 2003 ! - (By Laxxuss).pdf | 2006-Dec-28 06:47:44 | 17.8M | application/pdf |
| Prentice,.Cryptography.and.Network.Security.Principles.and.Practices.(2005),.4Ed.BBL.LotB.chm | 2006-Dec-28 06:47:46 | 12.4M | chemical/x-chemdraw |
| Springer,.Guide.to.Elliptic.Curve.Cryptography.(2004).kB.pdf | 2006-Dec-28 06:47:48 | 4.3M | application/pdf |
| [eBook] Real-Time Design Patterns - Robust Scalable Architecture for Real-Time Systems (Addison Wesley).pdf | 2006-Dec-28 06:47:40 | 6.6M | application/pdf |
| basic_cryptanalysis_techniques - Smith.pdf | 2006-Dec-28 06:47:46 | 661.5K | application/pdf |
| cryptology - applied cryptography 2ed - wiley.pdf | 2006-Dec-28 06:47:37 | 2.9M | application/pdf |
| none - Data Mining, An Overview From Database Perspective.pdf | 2006-Dec-28 06:47:38 | 2.1M | application/pdf |