Siga este link para ver outros tipos de publicações sobre o tema: Cryptography.

Livros sobre o tema "Cryptography"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores livros para estudos sobre o assunto "Cryptography".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.

1

Stinson, Douglas R., e Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Rubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Slayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Franklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Omondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Hirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Hirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ferguson, Niels, Bruce Schneier e Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Blaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Frankel, Yair, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Paar, Christof, e Jan Pelzl. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Wright, Rebecca N., ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45126-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Grasselli, Federico. Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64360-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Juels, Ari, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98935.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Syverson, Paul, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Hershey, J. E. Cryptography demystified. New York: McGraw-Hill, 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Alex, Moldovyan, ed. Innovative cryptography. 2a ed. Boston: Charles River Media, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Knudsen, Jonathan. Java cryptography. Sebastopol, Calif: O'Reilly, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Oppliger, Rolf. Contemporary cryptography. 2a ed. Boston: Artech House, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Paar, Christof, Jan Pelzl e Tim Güneysu. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-662-69007-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

1963-, Schneier Bruce, ed. Practical cryptography. New York: Wiley, 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

1953-, Baker Doris M., ed. Cryptography decrypted. Boston, MA: Addison-Wesley, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Garrett, Paul, e Daniel Lieman, eds. Public-Key Cryptography. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Buell, Duncan. Fundamentals of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Cheon, Jung Hee, e Jean-Pierre Tillich, eds. Post-Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81293-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Nissim, Kobbi, e Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90453-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Nissim, Kobbi, e Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90456-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Nissim, Kobbi, e Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Paterson, Maura B., ed. Cryptography and Coding. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92641-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Wachter-Zeh, Antonia, Hannes Bartz e Gianluigi Liva, eds. Code-Based Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98365-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Rogers, Daniel J. Broadband Quantum Cryptography. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02513-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Cryptography Cryptography Cryptography Cryptography. Independently Published, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Texto completo da fonte
Resumo:
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Martin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.

Texto completo da fonte
Resumo:
In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Texto completo da fonte
Resumo:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Buchanan, William J. Cryptography. River Publishers, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

), Hazell (Prestigiateur Pseud. Cryptography. Franklin Classics Trade Press, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Stinson, Douglas R. Cryptography. Chapman and Hall/CRC, 2005. http://dx.doi.org/10.1201/9781420057133.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Cryptography. River Publishers, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Cryptography. New York, USA: McGraw Hill Education, 2013.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Rubinstein-Salzedo, Simon. Cryptography. Springer, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Buchanan, William. Cryptography. River Publishers, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Buchanan, William. Cryptography. River Publishers, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Buchanan, William J. Cryptography. River Publishers, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Buchanan, William. Cryptography. River Publishers, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

), Hazell (Prestigiateur Pseud. Cryptography. Creative Media Partners, LLC, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia