Books on the topic 'Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Wheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Ren, Kui, and Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Kong, Debra Purdy. Fatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.
Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Biryukov, Alex, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Canteaut, Anne, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Leander, Gregor, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Preneel, Bart, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Gollmann, Dieter, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Dunkelman, Orr, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9.
Goos, Gerhard, Juris Hartmanis, Jan van Leeuwen, and Bruce Schneier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7.
Cid, Carlos, and Christian Rechberger, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0.
Biham, Eli, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052329.
Robshaw, Matthew, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11799313.
Joux, Antoine, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9.
Matsui, Mitsuru, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x.
Hong, Seokhie, and Tetsu Iwata, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4.
Daemen, Joan, and Vincent Rijmen, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9.
Moriai, Shiho, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3.
Anderson, Ross, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58108-1.
Vaudenay, Serge, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1.
Peyrin, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5.
Roy, Bimal, and Willi Meier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98177.
Gilbert, Henri, and Helena Handschuh, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137506.
Johansson, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b93938.
Nyberg, Kaisa, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71039-4.
Knudsen, Lars, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48519-8.
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Chatterjee, Sanjit. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Kiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9.
Yi, Xun, Russell Paulet, and Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.
Dobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.
), National Institute of Standards and Technology (U S. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Bishop, Matt. The fast encryption package. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.
National Institute of Standards and Technology (U.S.). Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Smith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Furht, Borivoje. Multimedia encryption and watermarking. New York: Springer, 2005.
Mikhailov, Sergey. Fractal modulation and encryption. Leicester: De Montfort University, 2000.
Loshin, Peter. Personal encryption clearly explained. San Diego: AP Professional, 1998.
Kiayias, Aggelos. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.
Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Lauter, Kristin, Wei Dai, and Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.
Blinn, Eric. Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.
Blinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Ciesla, Robert. Encryption for Organizations and Individuals. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2.
Coles, Michael, and Rodney Landrum. Expert SQL Server 2008 Encryption. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7.
Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Collins, Lauren M. Mobile Encryption: Securing and Encrypting Mobile Devices. Taylor & Francis Group, 2021.