Libri sul tema "Encryption"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Encryption".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Ahmad, Khairol Amali Bin, Khaleel Ahmad e Uma N. Dulhare, a cura di. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Testo completoWheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Cerca il testo completoRen, Kui, e Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Testo completoFatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.
Cerca il testo completoKoç, Çetin Kaya, Funda Özdemir e Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Testo completoBiryukov, Alex, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Testo completoCanteaut, Anne, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Testo completoLeander, Gregor, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Testo completoPreneel, Bart, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Testo completoGollmann, Dieter, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Testo completoChatterjee, Sanjit, e Palash Sarkar. Identity-Based Encryption. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Testo completoDunkelman, Orr, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9.
Testo completoGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen e Bruce Schneier, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7.
Testo completoCid, Carlos, e Christian Rechberger, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0.
Testo completoBiham, Eli, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052329.
Testo completoRobshaw, Matthew, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11799313.
Testo completoJoux, Antoine, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9.
Testo completoMatsui, Mitsuru, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x.
Testo completoHong, Seokhie, e Tetsu Iwata, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4.
Testo completoDaemen, Joan, e Vincent Rijmen, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9.
Testo completoMoriai, Shiho, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3.
Testo completoAnderson, Ross, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58108-1.
Testo completoVaudenay, Serge, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1.
Testo completoPeyrin, Thomas, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5.
Testo completoRoy, Bimal, e Willi Meier, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98177.
Testo completoGilbert, Henri, e Helena Handschuh, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137506.
Testo completoJohansson, Thomas, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b93938.
Testo completoNyberg, Kaisa, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71039-4.
Testo completoKnudsen, Lars, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48519-8.
Testo completoNational Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Cerca il testo completo1969-, Sarkar Palash, e SpringerLink (Online service), a cura di. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Cerca il testo completoKiayias, Aggelos, e Serdar Pehlivanoglu. Encryption for Digital Content. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9.
Testo completoYi, Xun, Russell Paulet e Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.
Testo completoDobbertin, Hans, Vincent Rijmen e Aleksandra Sowa, a cura di. Advanced Encryption Standard – AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.
Testo completoComputer Systems Laboratory (U.S.), a cura di. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoBishop, Matt. The fast encryption package. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.
Cerca il testo completoComputer Systems Laboratory (U.S.), a cura di. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoSmith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Cerca il testo completoEdin, Muharemagic, e Socek Daniel, a cura di. Multimedia encryption and watermarking. New York: Springer, 2005.
Cerca il testo completoMikhailov, Sergey. Fractal modulation and encryption. Leicester: De Montfort University, 2000.
Cerca il testo completoPersonal encryption clearly explained. San Diego: AP Professional, 1998.
Cerca il testo completoSerdar, Pehlivanoglu, e SpringerLink (Online service), a cura di. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.
Cerca il testo completoLibrary of Congress. Congressional Research Service., a cura di. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Cerca il testo completoLauter, Kristin, Wei Dai e Kim Laine, a cura di. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.
Testo completoBlinn, Eric. Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.
Testo completoBlinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Testo completoCiesla, Robert. Encryption for Organizations and Individuals. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2.
Testo completoColes, Michael, e Rodney Landrum. Expert SQL Server 2008 Encryption. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7.
Testo completoXu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Cerca il testo completoCollins, Lauren M. Mobile Encryption: Securing and Encrypting Mobile Devices. Taylor & Francis Group, 2021.
Cerca il testo completo