Your search returned 1560 results. Subscribe to this search

|
Security Protocols XXIII [electronic resource] : 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers / edited by Bruce Christianson, Petr Švenda, Vashek Maty�aš, James Malcolm, Frank Stajano, Jonathan Anderson.

by Christianson, Bruce [editor.] | Švenda, Petr [editor.] | Maty�aš, Vashek [editor.] | Malcolm, James [editor.] | Stajano, Frank [editor.] | Anderson, Jonathan [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2015.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Online access: Click here to access online Availability: No items available

Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low.

by Stamp, Mark [author.] | Low, Richard M, 1967- | IEEE Xplore (Online service) [distributor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley-Interscience, c2007Online access: Abstract with links to resource Availability: No items available

Machine learning in image steganalysis / Hans Georg Schaathun.

by Schaathun, Hans Georg [author.] | IEEE Xplore (Online Service) [distributor.] | John Wiley & Sons [publisher.].

Material type: book Book; Format: available online remote Publisher: Chichester, West Sussex, U.K. : John Wiley, 2012Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2012]Online access: Abstract with links to resource Availability: No items available

Algorithmic problems of group theory, their complexity, and applications to cryptography / [electronic resource] Delaram Kahrobaei, Vladimir Shpilrain, editors.

by Kahrobaei, Delaram, 1975- [editor.] | Shpilrain, Vladimir, 1960- [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Providence, Rhode Island : American Mathematical Society, [2014]Online access: Contents | Contents Availability: No items available

Implementing cryptography using Python [electronic resource] / Shannon W. Bray.

by Bray, Shannon, 1972-.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2020Online access: Wiley Online Library Availability: No items available

Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / Roger A. Grimes.

by Grimes, Roger A [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley, 2020Online access: Wiley Online Library Availability: No items available

Handbook of image-based security techniques / Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.

by Shivani, Shivendra [author.] | Agarwal, Suneeta [author.] | Suri, Jasjit S [author.].

Material type: book Book; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, CRC Press, 2018Other title: Image-based security techniques.Online access: Click here to view. Availability: No items available

Advances of DNA computing in cryptography / edited by Suyel Namasudra and Ganesh Chandra Deka.

by Namasudra, Suyel | Deka, Ganesh Chandra, 1969-.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Milton : Chapman and Hall/CRC, [2019]Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available

Image encryption : a communication perspective / Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili.

by Abd el-Samie, Fathi E [author.] | Ahmed, Hossam Eldin H [author.] | Elashry, Ibrahim F [author.] | Shahieen, Mai H [author.] | Faragallah, Osama S [author.] | El-Rabaie, El-Sayed M [author.] | Alshebeili, Saleh A [author.].

Material type: book Book; Literary form: Not fiction Publisher: Boca Raton, [Florida] : CRC Press, [2014]Copyright date: ©2014Online access: Click here to view. Availability: No items available

RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra.

by Paul, Goutam [author.] | Maitra, Subhamoy, 1970-.

Material type: book Book; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, 2012Online access: Click here to view. Availability: No items available

Cryptographic and Information Security Approaches for Images and Videos / by S. Ramakrishnan.

by Ramakrishnan, S [author.] | Taylor and Francis.

Edition: First edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, [2018]Copyright date: ©2019Online access: Click here to view Availability: No items available

Information security and optimization / edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta.

by Tanwar, Rohit [editor.] | Choudhury, Tanupriya [editor.] | Zamani, Mazdak [editor.] | Gupta, Sunil, 1979- [editor.].

Edition: First edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : C&H\CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available

Secure searchable encryption and data management / Brij B. Gupta, Mamta.

by Gupta, Brij, 1982- [author.] | Mamta [author.].

Edition: First edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, 2021Copyright date: ©2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available

Emerging security algorithms and techniques / editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

by Ahmad, Khaleel [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2019Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available

Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie and Susan Landau.

by Diffie, Whitfield [author.] | Landau, Susan Eva | IEEE Xplore (Online Service) [distributor.] | MIT Press [publisher.].

Edition: Updated and expanded ed.Material type: book Book; Format: available online remote Publisher: Cambridge, Massachusetts ; MIT Press, 2010Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2010]Online access: Abstract with links to resource Availability: No items available

Burdens of proof : cryptographic culture and evidence law in the age of electronic documents / Jean-Fran�cois Blanchette.

by Blanchette, Jean-Fran�cois [author.] | IEEE Xplore (Online Service) [distributor.] | MIT Press [publisher.] | Project Muse.

Material type: book Book; Format: available online remote Publisher: Cambridge, Massachusetts : MIT Press, c2012Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2012]Online access: Abstract with links to resource Availability: No items available

Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low.

by Stamp, Mark [author.] | Low, Richard M, 1967- | IEEE Xplore (Online service) [distributor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley-Interscience, c2007Online access: Abstract with links to resource Availability: No items available

Machine learning in image steganalysis / Hans Georg Schaathun.

by Schaathun, Hans Georg [author.] | IEEE Xplore (Online Service) [distributor.] | John Wiley & Sons [publisher.].

Material type: book Book; Format: available online remote Publisher: Chichester, West Sussex, U.K. : John Wiley, 2012Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2012]Online access: Abstract with links to resource Availability: No items available

Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, The University of Electro-Communications, Japan, Yu Sasaki, NTT Secure Platform Laboratories, Japan, Yang Li, Nanjing University of Aeronautics and Astronautics, China.

by Sakiyama, Kazuo, 1971- | Sasaki, Yu | Li, Yang, 1986- | IEEE Xplore (Online Service) [distributor.] | Wiley [publisher.].

Material type: book Book; Format: available online remote Publisher: Singapore : John Wiley & Sons Singapore Pte, Ltd., 2015Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2015]Online access: Abstract with links to resource Availability: No items available

Hashing in computer science : fifty years of slicing and dicing / Alan G. Konheim.

by Konheim, Alan G, 1934- | IEEE Xplore (Online Service) [distributor.] | Wiley [publisher.].

Material type: book Book; Format: available online remote Publisher: Hoboken, New Jersey : John Wiley & Sons, c2010Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2010]Online access: Abstract with links to resource Availability: No items available