Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About the Library
    • A-Z Databases
    • Accessibility Tools
    • AppsAnywhere
    • Browse Journals
    • eBook Spotlight Collections
    • Reading Lists
    • Research Tools
    • Search the Library
    • Subject Guides

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

Bitcoin - Cryptographic hash function

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Bitcoin - Cryptographic hash function

The Mathematics of Diffie-Hellman Key Exchange

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about The Mathematics of Diffie-Hellman Key Exchange

Information security management handbook

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Information security management handbook

Public Key Infrastructure Testing

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Public Key Infrastructure Testing

Efficient Public Key Cryptosystem Resilientto Key Leakage Chosen Ciphertext Attacks

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Efficient Public Key Cryptosystem Resilientto Key Leakage Chosen Ciphertext Attacks

Security in Computing

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Security in Computing

Information security management handbook

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Information security management handbook

Incident Response Recommendations and Considerations for Cybersecurity Risk Management

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Incident Response Recommendations and Considerations for Cybersecurity Risk Management

Security Engineering: A Guide to Building Dependable Distributed Systems

Submitted by rest1 on Mon, 01/12/2026 - 09:29
Read more about Security Engineering: A Guide to Building Dependable Distributed Systems

Pagination

  • « First First page
  • ‹ Previous Previous page
  • …
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • …
  • Next › Next page
  • Last » Last page
Subscribe to

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Help
  • Feedback To Win

Footer3

  • About Arden University
  • Accessibility Statement
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2026 Arden University  | All rights reserved