Books on the topic 'Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Full textWheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Find full textRen, Kui, and Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Full textFatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.
Find full textKoç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Full textBiryukov, Alex, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Full textCanteaut, Anne, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Full textLeander, Gregor, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Full textPreneel, Bart, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Full textGollmann, Dieter, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Full textChatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Full textDunkelman, Orr, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9.
Full textGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen, and Bruce Schneier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7.
Full textCid, Carlos, and Christian Rechberger, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0.
Full textBiham, Eli, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052329.
Full textRobshaw, Matthew, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11799313.
Full textJoux, Antoine, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9.
Full textMatsui, Mitsuru, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x.
Full textHong, Seokhie, and Tetsu Iwata, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4.
Full textDaemen, Joan, and Vincent Rijmen, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9.
Full textMoriai, Shiho, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3.
Full textAnderson, Ross, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58108-1.
Full textVaudenay, Serge, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1.
Full textPeyrin, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5.
Full textRoy, Bimal, and Willi Meier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98177.
Full textGilbert, Henri, and Helena Handschuh, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137506.
Full textJohansson, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b93938.
Full textNyberg, Kaisa, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71039-4.
Full textKnudsen, Lars, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48519-8.
Full textNational Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textKiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9.
Full textYi, Xun, Russell Paulet, and Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.
Full textDobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.
Full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBishop, Matt. The fast encryption package. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.
Find full textComputer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full textEdin, Muharemagic, and Socek Daniel, eds. Multimedia encryption and watermarking. New York: Springer, 2005.
Find full textMikhailov, Sergey. Fractal modulation and encryption. Leicester: De Montfort University, 2000.
Find full textPersonal encryption clearly explained. San Diego: AP Professional, 1998.
Find full textSerdar, Pehlivanoglu, and SpringerLink (Online service), eds. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Find full textLauter, Kristin, Wei Dai, and Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.
Full textBlinn, Eric. Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.
Full textBlinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Full textCiesla, Robert. Encryption for Organizations and Individuals. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2.
Full textColes, Michael, and Rodney Landrum. Expert SQL Server 2008 Encryption. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7.
Full textXu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Find full textCollins, Lauren M. Mobile Encryption: Securing and Encrypting Mobile Devices. Taylor & Francis Group, 2021.
Find full text