Libri sul tema "Cryptography"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Cryptography.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 libri per l'attività di ricerca sul tema "Cryptography".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.

1

Stinson, Douglas R., e Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Rubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Slayton, Rebecca, a cura di. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Franklin, Matthew, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Omondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Hirschfeld, Rafael, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Hirchfeld, Rafael, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ferguson, Niels, Bruce Schneier e Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Blaze, Matt, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Frankel, Yair, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Paar, Christof, e Jan Pelzl. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Wright, Rebecca N., a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45126-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Grasselli, Federico. Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64360-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Juels, Ari, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98935.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Syverson, Paul, a cura di. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Hershey, J. E. Cryptography demystified. New York: McGraw-Hill, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Ferguson, Niels. Practical cryptography. New York: Wiley, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Internet cryptography. Reading, Mass: Addison-Wesley, 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Alex, Moldovyan, a cura di. Innovative cryptography. 2a ed. Boston: Charles River Media, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Knudsen, Jonathan. Java cryptography. Sebastopol, Calif: O'Reilly, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Oppliger, Rolf. Contemporary cryptography. 2a ed. Boston: Artech House, 2011.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Knudsen, Jonathan. Java cryptography. Cambridge: O'Reilly, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Mel, H. X. Cryptography decrypted. Boston, MA: Addison-Wesley, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Paar, Christof, Jan Pelzl e Tim Güneysu. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-662-69007-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Codes and cryptography. Oxford [Oxfordshire]: Clarendon Press, 1988.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

1959-, Chen Kefei, Xiao G. 1934- e International Workshop on Progress on Cryptography (2004 : Shanghai, China), a cura di. Progress on cryptography: 25 years of cryptography in China. Boston: Kluwer Academic Publishers, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

1969-, Joye Marc, e Neven Gregory, a cura di. Identity-based cryptography. Amsterdam, The Netherlands: IOS Press, 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Garrett, Paul, e Daniel Lieman, a cura di. Public-Key Cryptography. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Buell, Duncan. Fundamentals of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Cheon, Jung Hee, e Jean-Pierre Tillich, a cura di. Post-Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81293-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Nissim, Kobbi, e Brent Waters, a cura di. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90453-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Nissim, Kobbi, e Brent Waters, a cura di. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90456-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Cryptography Cryptography Cryptography Cryptography. Independently Published, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Testo completo
Abstract (sommario):
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Martin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.

Testo completo
Abstract (sommario):
In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Testo completo
Abstract (sommario):
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

F, Friedman William. Elementary Military Cryptography (Cryptographic Series , No 7). Aegean Park Pr, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Givierge, Marcel. Course in Cryptography (Cryptographic Series , No 19). Aegean Park Press, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Advanced Military Cryptography (Cryptographic Series , No 8). Aegean Park Press, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Buchanan, William J. Cryptography. River Publishers, 2017.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
45

), Hazell (Prestigiateur Pseud. Cryptography. Franklin Classics Trade Press, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Stinson, Douglas R. Cryptography. Chapman and Hall/CRC, 2005. http://dx.doi.org/10.1201/9781420057133.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Buchanan, William. Cryptography. River Publishers, 2022.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Buchanan, William. Cryptography. River Publishers, 2022.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Anderson, Rane. Cryptography. Teacher Created Materials, Incorporated, 2017.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Buchanan, William J. Cryptography. River Publishers, 2017.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia