Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /
Search for more channels:

Similar Items: High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /

Elliptic curves : number theory and cryptography /

The art of software security assessment : identifying and preventing software vulnerabilities /

Principles of information systems security : text and cases /

Managing information systems security and privacy /

Improving security performance on the banking system distributed database \

Information security : principles and practices /

Integrating security and software engineering : advances and future visions /

Book theft and library security systems, 1978-79 /

The History of information security : A Comprehensive Handbook /

Principles of information security /

Principles of information security /

Management of information security /

Computer security : principles and practice /

Risk Assessment in Cyber-Physical System /

Management of information security /

System software : an introduction to systems programming /

Network security : how to plan for it and achieve it /

Information security and IT risk management /

Network security essentials : applications and standards /

Network security essentials : applications and standards /

Topic: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Topic: Internet of things

  • Topic: Security measures

Internet of Things for the Purpose of Smart Crowd Management and Personalized Recommendations in Large Public Spaces /

IoT-Based Remote HealthCare Monitoring System for the Pilgrims /

High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /

Healthcare Management Framework Using Internet of Things IoT/

Severity Prediction in COVID-19 Patients Using Machine Learning Algorithms /

Author: Aldalbahy, Wafa Saif

High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /

Author: Al-Khatib, Mohammed

High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind