Books on the topic 'Encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Find full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Find full textHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Find full textGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Find full textSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Find full textS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Find full textShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Find full textWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Find full textX, Ritter G., and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image pattern recognition, compression, coding, and encryption X, with applications: 26-27 August, 2007, San Diego, California, USA. Bellingham, Wash: SPIE, 2007.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. Bellingham, Wash., USA: SPIE, 1998.
Find full textEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Berlin: Springer, 2000.
Find full text1963-, Preneel Bart, ed. Advances in cryptology: EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings. Berlin: Springer, 2000.
Find full textChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.
Find full textprofesseur, Stern Jacques, ed. Advances in cryptology, EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 : proceedings. Berlin: Springer, 1999.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Boeing Company, eds. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. Bellingham, Wash., USA: SPIE, 2003.
Find full textname, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. Bellingham, WA: SPIE, 2003.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. Bellingham, Wash: SPIE, 2001.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VI, with applications: 5 and 7 August 2003, San Diego, California, USA. Bellingham, Wash., USA: SPIE, 2004.
Find full textYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Boston, MA: Springer-Verlag US, 2009.
Find full text(Society), SPIE, ed. Mathematics for signal and information processing: 2-5 August 2009, San Diego, California, United States. Bellingham, Wash: SPIE, 2009.
Find full textS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Society for Industrial and Applied Mathematics., eds. Mathematics of data/image coding, compression, and encryption II: 19-20 July, 1999, Denver, Colorado. Bellingham, Washington: SPIE, 1999.
Find full textSchmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2010.
Find full textKaisa, Nyberg, and International Association for Cryptologic Research., eds. Advances in cryptology: EUROCRYPT '98 : International Conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 : proceedings. Berlin: Springer, 1998.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Find full textMultimedia Content Encryption: Techniques and Applications. AUERBACH, 2008.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Edited by Borko Furht and Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.
Full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Limited, John, 2020.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2019.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Find full textMcAmis, Monica. Steganographic techniques in cryptography. 2000.
Find full textSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2012.
Find full textSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2009.
Find full textModern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley, 2008.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textEmerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full text