Call Number (LC) Title Results
QA268 .C66 1988 Coding theory and applications 2nd international colloquium, Cachan-Paris, France, November 24-26, 1986 : proceedings /
Coding theory and applications : 2nd international colloquium, Cachan-Paris, France, November 24-26, 1986 : proceedings /
2
QA268 .C662 2008eb Coding theory and applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008 : proceedings / 1
QA268 .C67 1989 Coding theory and applications : 3rd international colloquium, Toulon, France, November 2-4, 1988 : proceedings / 1
QA268 .C67 2000 Coding theory and cryptography : from enigma and Geheimschreiber to quantum theory / 1
QA268 .C68 1990 Coding theory and design theory / 1
QA268 .C69 1991 Coding theory : the essentials / 1
QA268 .C69 2000 Coding theory and cryptography : the essentials / 1
QA268 .C69 2000eb Coding theory and cryptography : the essentials / 1
QA268 .C695 2002 Coding theory and cryptology / 1
QA268 .C75 Cryptography and coding. 1
QA268 .C76 1995 Cryptography and coding : 5th IMA conference, Cirencester, UK, December 18-20, 1995 : proceedings / 1
QA268 .C76 2001 Cryptography and coding 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings / 1
QA268 .C76 2003 Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 2003 : proceedings / 1
QA268 .C76 2007eb Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings / 1
QA268 .C77 2001 Cryptography and computational number theory / 1
QA268 .C78 1981 Information theory coding theorems for discrete memoryless systems /
Information theory : coding theorems for discrete memoryless systems /
2
QA268 .C783 1972 Information transmission with simbols [sic] of different cost course held at the Department of Automation and Information, June, 1972. 1
QA268 .C79 2011eb Information theory : coding theorems for discrete memoryless systems / 3
QA268 .D47 2012eb Noiseless steganography : the key to covert communications / 2
QA268 .D476 2012 Noiseless steganography the key to covert communications / 1