Books on the topic 'Secret-key cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 books for your research on the topic 'Secret-key cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Warner, Penny. The secret of the skeleton key. New York: Egmont USA, 2011.
Find full textGalbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Find full textCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Find full textSecret warriors: Key scientists, code breakers and propagandists of the Great War. London: Little, Brown, 2014.
Find full textNoiseless steganography: The key to covert communications. Boca Raton: Auerbach Publications, 2012.
Find full text1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Wilmington, Del: Scholarly Resources Inc., 1988.
Find full textAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.
Find full textAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.
Find full textAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.
Find full textAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.
Find full textSecret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Find full textRubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Find full textGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2003.
Find full textGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2012.
Find full textDowning, Taylor. Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Little, Brown Book Group Limited, 2014.
Find full textSecret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Abacus, 2001.
Find full textDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Find full textDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Find full textDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Taylor & Francis Group, 2012.
Find full textDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Find full text