<?xml version='1.0' encoding='utf-8' ?>



<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[NUST Institutions Library Catalogue Search for 'Provider:MCS ']]></title>
     <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=Provider%3AMCS%20&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=Provider%3AMCS%20&amp;sort_by=relevance_dsc&amp;format=atom"/>
     <description><![CDATA[ Search results for 'Provider:MCS ' at NUST Institutions Library Catalogue]]></description>
     <opensearch:totalResults>2988</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Multiband printed antennas using metamaterial structures






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=119599</link>
        
       <description><![CDATA[









	   <p>By Islam,Ul Zain (MSEE-17). 
	   Rawalpindi MCS,NUST 2014
                        . ix,51, p;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=119599">Place Hold on <em>Multiband printed antennas using metamaterial structures</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=119599</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Algebrraic Cryptanalysis  Of Feistel Structure Based Light Weight Block Ciphers 


    Lt Cdr Nasir Mehmood PN   





</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=121681</link>
        
       <description><![CDATA[









	   <p>By Mehmood, Nasir ( MSIS-09). 
	   Rawalpindi MCS NUST 2014
                        . xiii, 81p
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=121681">Place Hold on <em>Algebrraic Cryptanalysis  Of Feistel Structure Based Light Weight Block Ciphers </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=121681</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Image compression using modified set partitioning in hierarchical Trees Algorithms Reducing Memory Space






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=128087</link>
        
       <description><![CDATA[









	   <p>By Rehman,Maria (MSEE-18). 
	   Rawalpindi MCS (NUST) 2014
                        .  vi,77,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=128087">Place Hold on <em>Image compression using modified set partitioning in hierarchical Trees Algorithms Reducing Memory Space</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=128087</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Internet cookies-threats to privacy, consequences and their remedial measures






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180651</link>
        
       <description><![CDATA[









	   <p>By Mairaj, Junaid   (MSIS-2). 
	   Rawalpindi MCS (NUST) 2009
                        . xii, 87 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180651">Place Hold on <em>Internet cookies-threats to privacy, consequences and their remedial measures</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180651</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Security Enhancements for privacy and key management protocol in IEEE 802.16e-2005






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180654</link>
        
       <description><![CDATA[









	   <p>By Altaf, Ayesha   (MSIS-5). 
	   Rawalpindi MCS (NUST) 2009
                        . xi,54, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180654">Place Hold on <em>Security Enhancements for privacy and key management protocol in IEEE 802.16e-2005</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180654</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Efficient implementation of spread spectrum based steganographic technique






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180656</link>
        
       <description><![CDATA[









	   <p>By Ashraf, Muhammad  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . ix,66 ,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180656">Place Hold on <em>Efficient implementation of spread spectrum based steganographic technique</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180656</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Augmented security in IEEE-802.22 mac layer protocol






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180658</link>
        
       <description><![CDATA[









	   <p>By Shaukat, Rakhshanda  ( MSIS-5). 
	   Rawalpindi MCS (NUST) 2009
                        . x,87, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180658">Place Hold on <em>Augmented security in IEEE-802.22 mac layer protocol</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180658</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis of voice over internet protocol (VoIP) and development of a generic technique  to detect VoIP traffic  (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180661</link>
        
       <description><![CDATA[









	   <p>By Idrees, Fauzia  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . xi,69, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180661">Place Hold on <em>Analysis of voice over internet protocol (VoIP) and development of a generic technique  to detect VoIP traffic  (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180661</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Performance comparison and evaluation of 802.011 A and its implementation in reconfigrable environment






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180665</link>
        
       <description><![CDATA[









	   <p>By Zia, Saba     MSIS. 
	   MCS 2009
                        . 82 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180665">Place Hold on <em>Performance comparison and evaluation of 802.011 A and its implementation in reconfigrable environment</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180665</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Defining wireless network security policy for defense organization and integrating BLP model in the policy for access control (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180668</link>
        
       <description><![CDATA[









	   <p>By Abbas, Adnan   (MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . ix, 47p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180668">Place Hold on <em>Defining wireless network security policy for defense organization and integrating BLP model in the policy for access control (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180668</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Securing the GPRS network  (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180672</link>
        
       <description><![CDATA[









	   <p>By Imran Ishaq   (MSIS-2). 
	   Rawalpindi MCS (NUST) 2009
                        . xii,66 ,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180672">Place Hold on <em>Securing the GPRS network  (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180672</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis and enhancement of security framework of internet key exchange protocol for IPSEC- based networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180674</link>
        
       <description><![CDATA[









	   <p>By Safeer, Ghulam ( MSIS-3). 
	   Rawalpindi MCS NUST) 2007
                        . ix, 51 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180674">Place Hold on <em>Analysis and enhancement of security framework of internet key exchange protocol for IPSEC- based networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180674</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The design of a symmetric cryptographic system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180677</link>
        
       <description><![CDATA[









	   <p>By Hussain, Muhammad Junaid     (MSIS-1). 
	   Rawalpindi MCS (NUST) 2004
                        . ix, 57 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180677">Place Hold on <em>The design of a symmetric cryptographic system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180677</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Security of 802.11i based wireless local area networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180679</link>
        
       <description><![CDATA[









	   <p>By Khan, Mansoor Ahmed  ( MSIS-5). 
	   Rawalpindi MCS (NUST) 2008
                        . xii, 78 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180679">Place Hold on <em>Security of 802.11i based wireless local area networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180679</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Development of software for encryption/decryption system based on symmetric cryptographic algorithm






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180681</link>
        
       <description><![CDATA[









	   <p>By Tipu, Adnan Mazhar  ( MSIS-1). 
	   Rawalpindi MCS (NUST) 2005
                        . ix, 98 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180681">Place Hold on <em>Development of software for encryption/decryption system based on symmetric cryptographic algorithm</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180681</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Developing SCA compliant security component and converting existing communication system into SCA-compliant SDR using OSSIE






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180683</link>
        
       <description><![CDATA[









	   <p>By Khan, Muhammad Usman Shahid  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 48 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180683">Place Hold on <em>Developing SCA compliant security component and converting existing communication system into SCA-compliant SDR using OSSIE</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180683</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Performance enhancement of signature -based network intrusion detection system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180685</link>
        
       <description><![CDATA[









	   <p>By Saeed, Muhammad Tariq   (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 59 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180685">Place Hold on <em>Performance enhancement of signature -based network intrusion detection system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180685</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Performance and security analysis of IEEE 802.1X authentication methods






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180687</link>
        
       <description><![CDATA[









	   <p>By Khan, Muzammil Ahmed   ( MSIS-3). 
	   Rawalpindi MCS (NUST) 2007
                        . xii, 92 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180687">Place Hold on <em>Performance and security analysis of IEEE 802.1X authentication methods</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180687</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis of skype security features to facilitate its detection, classification and blocking






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180689</link>
        
       <description><![CDATA[









	   <p>By Khan, Uzma Aslam     (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xi, 83 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180689">Place Hold on <em>Analysis of skype security features to facilitate its detection, classification and blocking</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180689</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analyzing the effectiveness of IEEE 802.11 wireless LAN standard's security mechanism






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180691</link>
        
       <description><![CDATA[









	   <p>By Ilyas, Muhammad Umar   (MSIS-2). 
	   Rawalpindi MCS (NUST) 2006
                        . xi, 84 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180691">Place Hold on <em>Analyzing the effectiveness of IEEE 802.11 wireless LAN standard's security mechanism</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180691</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Techniques of physical side channel crypt analysis






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180693</link>
        
       <description><![CDATA[









	   <p>By Rehman, Atiqur   ( MSIS-2). 
	   Rawalpindi MCS (NUST) 2008
                        . x, 91, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180693">Place Hold on <em>Techniques of physical side channel crypt analysis</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180693</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A secure end -to- end public key architecture for wireless sensor networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180695</link>
        
       <description><![CDATA[









	   <p>By Naureen, Ayesha  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xii, 78, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180695">Place Hold on <em>A secure end -to- end public key architecture for wireless sensor networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180695</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A secure cluster based hybrid key man management architecture for wireless sensor networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180697</link>
        
       <description><![CDATA[









	   <p>By Akram, Attiya  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . x, 67,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180697">Place Hold on <em>A secure cluster based hybrid key man management architecture for wireless sensor networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180697</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Joint ICI cancellation, channel estimation and error correction in iterative fashion






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180700</link>
        
       <description><![CDATA[









	   <p>By Sabir, Zeeshan  (MSEE-13). 
	   Rawalpindi MCS, NUST 2009
                        . xiii,107 ,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180700">Place Hold on <em>Joint ICI cancellation, channel estimation and error correction in iterative fashion</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180700</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    User web activity monitoring






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180710</link>
        
       <description><![CDATA[









	   <p>By Ahmed, Muhammad Kamran   (MSIS-6). 
	   Rawalpindi MCS (NUST) 2009
                        . x, 74, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180710">Place Hold on <em>User web activity monitoring</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180710</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A lightweight rabbit based security architecture for wireless sensor networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180731</link>
        
       <description><![CDATA[









	   <p>By Tahir, Ruhma     (MSIS-5). 
	   Rawalpindi MCS NUST) 2008
                        . xiii,66 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180731">Place Hold on <em>A lightweight rabbit based security architecture for wireless sensor networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180731</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Resolving the authentication-connection association problem in port knocking and single packet authorization based dynamic firewalls (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180735</link>
        
       <description><![CDATA[









	   <p>By Tariq, Muhammad  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 63 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180735">Place Hold on <em>Resolving the authentication-connection association problem in port knocking and single packet authorization based dynamic firewalls (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180735</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Mobile adhoc networks- a secure and efficient key management scheme






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180737</link>
        
       <description><![CDATA[









	   <p>By Mahmood, Syed Azhar  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xi,72, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180737">Place Hold on <em>Mobile adhoc networks- a secure and efficient key management scheme</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180737</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Enhancement of security framework for mobile agent based intrusion detection system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180744</link>
        
       <description><![CDATA[









	   <p>By Aslam , Lieut Commander Muhammad   ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . viii, 51,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180744">Place Hold on <em>Enhancement of security framework for mobile agent based intrusion detection system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180744</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Protecting network services by large-scale simulation of hybrid-interaction decoys






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180756</link>
        
       <description><![CDATA[









	   <p>By Masood, Syed Yasir  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . ix,44 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180756">Place Hold on <em>Protecting network services by large-scale simulation of hybrid-interaction decoys</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180756</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    An extended visual secret sharing scheme for authentication






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180759</link>
        
       <description><![CDATA[









	   <p>By Sirhindi, Rabia  (MSIS-5). 
	   Rawalpindi MCS (NUST) 2008
                        . ix,53, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180759">Place Hold on <em>An extended visual secret sharing scheme for authentication</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180759</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Design and analysis of non- linear random sequence generator






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180790</link>
        
       <description><![CDATA[









	   <p>By Ahmad, Masaud  ( MSIS-1). 
	   Rawalpindi MCS (NUST) 2005
                        . 80,P.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180790">Place Hold on <em>Design and analysis of non- linear random sequence generator</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180790</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Design and implementation of an optical loop tester /






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180793</link>
        
       <description><![CDATA[









	   <p>By Shaheen, NC Sabahat   (TE-42). 
	   Rawalpindi MCS 2009
                        . 79 p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180793">Place Hold on <em>Design and implementation of an optical loop tester /</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180793</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Addressing security concerns of data exchange in AODV protocol






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180794</link>
        
       <description><![CDATA[









	   <p>By Akhlaq, Monis    (MSIS-3). 
	   Rawalpindi MCS (NUST) 2006
                        . x,186, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180794">Place Hold on <em>Addressing security concerns of data exchange in AODV protocol</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180794</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
     Authentication in multi hop wireless mesh networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180796</link>
        
       <description><![CDATA[









	   <p>By Khan, Kaleemullah    (MSIS-2). 
	   Rawalpindi MCS (NUST) 2007
                        . ix, 79, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180796">Place Hold on <em> Authentication in multi hop wireless mesh networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180796</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Evaluation of different symmetric key cryptographic algorithms and design a new data encryption algorithm






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180798</link>
        
       <description><![CDATA[









	   <p>By Shah, Syed Tahir Hussain    (MSIS-2). 
	   Rawalpindi MCS (NUST) 2006
                        . vii,66, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180798">Place Hold on <em>Evaluation of different symmetric key cryptographic algorithms and design a new data encryption algorithm</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180798</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analyzing ieee 802.11 wireless lan for identity vulnerabilities and finding soluation to dos attacks based on these vulnerabilities






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180800</link>
        
       <description><![CDATA[









	   <p>By Baber ,Aslam (MSIS-3). 
	    Rwp MCS (NUST) 2006
                        . xi,66,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180800">Place Hold on <em>Analyzing ieee 802.11 wireless lan for identity vulnerabilities and finding soluation to dos attacks based on these vulnerabilities</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180800</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Security analysis of ultra-lightweight cryptographic protocol:   Gossamer protocol






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180809</link>
        
       <description><![CDATA[









	   <p>By Bilal, Zeeshan  ( MSIS-6). 
	   Rawalpindi MCS (NUST) 2010
                        . ix,52, p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180809">Place Hold on <em>Security analysis of ultra-lightweight cryptographic protocol:   Gossamer protocol</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180809</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A technique to discourage the relay attack on captcha






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180814</link>
        
       <description><![CDATA[









	   <p>By Khan, Samin Jan   (MSIS-5). 
	   Rawalpindi MCS(NUST) 2010
                        . x, 71, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180814">Place Hold on <em>A technique to discourage the relay attack on captcha</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180814</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Design and analysis of an attack resistant authentication protocol






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180848</link>
        
       <description><![CDATA[









	   <p>By Amin, Sajjad (Cryptology-1) . 
	   MCS 1999
                        . 148 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180848">Place Hold on <em>Design and analysis of an attack resistant authentication protocol</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180848</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Taxonomy of cryptanalysis in Pakistan based on the experience of allied cryptanalysis efforts during world war-II






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180853</link>
        
       <description><![CDATA[









	   <p>By Rehman, Zaka Ur (Cryptology-1) . 
	   MCS, 1999
                        . 126 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180853">Place Hold on <em>Taxonomy of cryptanalysis in Pakistan based on the experience of allied cryptanalysis efforts during world war-II</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180853</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Performance analysis of ipsec in wired and wireless networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180862</link>
        
       <description><![CDATA[









	   <p>By Ali, Anwer   (MSIS-2). 
	   Rawalpindi MCS (NUST) 2007
                        . vii, 86, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180862">Place Hold on <em>Performance analysis of ipsec in wired and wireless networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180862</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Designing of a software tool for cryptographic analysis of speech compression algorithm celp






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180865</link>
        
       <description><![CDATA[









	   <p>By Zia, Jamil Ahmad  (MSIS-2). 
	   Rawalpindi MCS (NUST) 2003
                        . ix, 78, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180865">Place Hold on <em>Designing of a software tool for cryptographic analysis of speech compression algorithm celp</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180865</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    High volume secure data hiding in video






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180867</link>
        
       <description><![CDATA[









	   <p>By Pirzada, Asad Amir  ( MSIS-1). 
	   Rawalpindi MCS (NUST) 2003
                        . 69, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180867">Place Hold on <em>High volume secure data hiding in video</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180867</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Development of key management system for the IPSEC protocols






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180869</link>
        
       <description><![CDATA[









	   <p>By Mian, Saeed Ajmal  (MSIS-1). 
	   Rawalpindi MCS (NUST) 2003
                        . 153, p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180869">Place Hold on <em>Development of key management system for the IPSEC protocols</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180869</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Information theoretic analysis of data represented in roman Urdu against normal English






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180872</link>
        
       <description><![CDATA[









	   <p>By Ali, Arshad  (Cryptology-1). 
	   MCS 1999
                        . xi, 95 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180872">Place Hold on <em>Information theoretic analysis of data represented in roman Urdu against normal English</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180872</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Design and analysis of symmetric cryptographic algorithm based on 256-bit key or greater for computer communications






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180874</link>
        
       <description><![CDATA[









	   <p>By Muhammad,Talha  (Cryptology-1). 
	   MCS 1999
                        . 65 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180874">Place Hold on <em>Design and analysis of symmetric cryptographic algorithm based on 256-bit key or greater for computer communications</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180874</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Reducing the overhead cost for different mobility models in Ad hoc on demand distance vector (AODV) protocol






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180876</link>
        
       <description><![CDATA[









	   <p>By Kawish, Babar Sarwar  ( MSIS-3). 
	   Rawalpindi MCS (NUST) 2007
                        . x, 86, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180876">Place Hold on <em>Reducing the overhead cost for different mobility models in Ad hoc on demand distance vector (AODV) protocol</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180876</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Context and role based access control model of an educational system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180878</link>
        
       <description><![CDATA[









	   <p>By Dar, Muhammad Luqman   (MSIS-2). 
	   Rawalpindi MCS (NUST) 2008
                        . vii, 73,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180878">Place Hold on <em>Context and role based access control model of an educational system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180878</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CCESMES Comprehensive Cost Estimation System For Military Engineering Services






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180880</link>
        
       <description><![CDATA[









	   <p>By Ahmed, Zaheer    MSCS. 
	   Rawalpindi MCS, NUST 2000
                        . 96 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180880">Place Hold on <em>CCESMES Comprehensive Cost Estimation System For Military Engineering Services</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180880</guid>
     </item>
	 
   </channel>
</rss>





