Libros sobre el tema "Cryptography"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Cryptography.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores mejores libros para su investigación sobre el tema "Cryptography".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Stinson, Douglas R. y Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Rubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Slayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Franklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Omondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ferguson, Niels, Bruce Schneier y Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Blaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Frankel, Yair, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Paar, Christof y Jan Pelzl. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Wright, Rebecca N., ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45126-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Grasselli, Federico. Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64360-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Juels, Ari, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98935.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Syverson, Paul, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Hershey, J. E. Cryptography demystified. New York: McGraw-Hill, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Ferguson, Niels. Practical cryptography. New York: Wiley, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Internet cryptography. Reading, Mass: Addison-Wesley, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Alex, Moldovyan, ed. Innovative cryptography. 2a ed. Boston: Charles River Media, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Knudsen, Jonathan. Java cryptography. Sebastopol, Calif: O'Reilly, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Oppliger, Rolf. Contemporary cryptography. 2a ed. Boston: Artech House, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Knudsen, Jonathan. Java cryptography. Cambridge: O'Reilly, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Mel, H. X. Cryptography decrypted. Boston, MA: Addison-Wesley, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Paar, Christof, Jan Pelzl y Tim Güneysu. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-662-69007-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Codes and cryptography. Oxford [Oxfordshire]: Clarendon Press, 1988.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

1959-, Chen Kefei, Xiao G. 1934- y International Workshop on Progress on Cryptography (2004 : Shanghai, China), eds. Progress on cryptography: 25 years of cryptography in China. Boston: Kluwer Academic Publishers, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

1969-, Joye Marc y Neven Gregory, eds. Identity-based cryptography. Amsterdam, The Netherlands: IOS Press, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Garrett, Paul y Daniel Lieman, eds. Public-Key Cryptography. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Buell, Duncan. Fundamentals of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Cheon, Jung Hee y Jean-Pierre Tillich, eds. Post-Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81293-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Nissim, Kobbi y Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90453-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Nissim, Kobbi y Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90456-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Cryptography Cryptography Cryptography Cryptography. Independently Published, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Texto completo
Resumen
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Martin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.

Texto completo
Resumen
In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Texto completo
Resumen
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

F, Friedman William. Elementary Military Cryptography (Cryptographic Series , No 7). Aegean Park Pr, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Givierge, Marcel. Course in Cryptography (Cryptographic Series , No 19). Aegean Park Press, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Advanced Military Cryptography (Cryptographic Series , No 8). Aegean Park Press, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Buchanan, William J. Cryptography. River Publishers, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

), Hazell (Prestigiateur Pseud. Cryptography. Franklin Classics Trade Press, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Stinson, Douglas R. Cryptography. Chapman and Hall/CRC, 2005. http://dx.doi.org/10.1201/9781420057133.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Buchanan, William. Cryptography. River Publishers, 2022.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Buchanan, William. Cryptography. River Publishers, 2022.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Anderson, Rane. Cryptography. Teacher Created Materials, Incorporated, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Buchanan, William J. Cryptography. River Publishers, 2017.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía