Search Results - "cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography 102
- Computer security 51
- Security measures 34
- Coding theory 23
- Data encryption (Computer science) 23
- Computer networks 20
- Ciphers 14
- Access control 11
- Computers 11
- Congresses 11
- Data protection 7
- Number theory 6
- Mathematics 5
- World War, 1939-1945 5
- Electronic commerce 4
- History 4
- Public key cryptography 4
- Secret service 4
- Telecommunication 4
- Blockchains (Databases) 3
- Curves, Elliptic 3
- Data processing 3
- Data transmission systems 3
- Electronic funds transfers 3
- Examinations 3
- Public key infrastructure (Computer security) 3
- Certification 2
- Computer network protocols 2
- Database management 2
- Database security 2
-
101
Applied cryptanalysis breaking ciphers in the real world
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
102
-
103
Intelligent multimedia data hiding new directions
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
104
The history of information security a comprehensive handbook
Published 2007Subjects: “…Cryptography History…”
Click Here to View Status and Holdings.
Unknown -
105
Mathematical recreations and essays
Published 1963Subjects: “…Cryptography…”
Click Here to View Status and Holdings.
Unknown -
106
Authentication codes and combinatorial designs
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
107
-
108
Modern cryptology a tutorial
Published 1988Subjects: “…Cryptography…”
Click Here to View Status and Holdings.
Unknown -
109
RSA security's official guide to crytography
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
110
Information security intelligence cryptographic principles & applications
Published 2004Subjects: Click Here to View Status and Holdings.
Unknown -
111
Cryptanalysis of RSA and its variants
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
112
Differential cryptanalysis of the data encryption standard
Published 1993Subjects: Click Here to View Status and Holdings.
Unknown -
113
-
114
Hashing in computer science fifty years of slicing and dicing
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
115
The secret war
Published 1982Subjects: “…World War, 1939-1945 Cryptography…”
Click Here to View Status and Holdings.
Unknown -
116
A STUDY ON BITTORRENT (PEER-TO-PEER) PERFORMANCE BANDWITH UTILIZATION AND CONTENT DISTRIBUTION
Published 2003Subjects: Click Here to View Status and Holdings.
Thesis Book -
117
Introduction to identity-based encryption
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
118
Web application obfuscation '-/WAFs..Evasion..Filters//alert (/Obfuscation/)-'
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
119
Body of secrets anatomy of the ultra-secret National Security Agency
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
120
ROOM 40 British Naval Intelligence 1914-1918
Published 1984Subjects: “…World War, 1914-1918 Cryptography…”
Click Here to View Status and Holdings.
Book