Bücher zum Thema „Encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenHeld, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.
Den vollen Inhalt der Quelle findenBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Den vollen Inhalt der Quelle findenGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.
Den vollen Inhalt der Quelle findenSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.
Den vollen Inhalt der Quelle findenWold, Geoffrey H. Computer crime: Techniques, prevention. Bankers Pub. Co., 1989.
Den vollen Inhalt der Quelle findenEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.
Den vollen Inhalt der Quelle findenChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Springer-Verlag Berlin Heidelberg, 1988.
Den vollen Inhalt der Quelle findenNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.
Den vollen Inhalt der Quelle findenNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. SPIE, 1998.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. SPIE, 2001.
Den vollen Inhalt der Quelle findenname, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. SPIE, 2003.
Den vollen Inhalt der Quelle findenSchmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2010.
Den vollen Inhalt der Quelle findenYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.
Den vollen Inhalt der Quelle findenEUROCRYPT '97 ( 1997 Konstanz, Germany). Advances in cryptology--EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings. Springer, 1997.
Den vollen Inhalt der Quelle findenJohansson, Thomas. Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Den vollen Inhalt der Quelle findenRiviera), EUROCRYPT (2010 French. Advances in cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings. Springer, 2010.
Den vollen Inhalt der Quelle findenRueppel, Rainer A. Advances in Cryptology -- EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings. Springer-Verlag Berlin Heidelberg, 1993.
Den vollen Inhalt der Quelle findenHelleseth, Tor. Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. Springer-Verlag Berlin Heidelberg, 1994.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Den vollen Inhalt der Quelle findenMultimedia Content Encryption: Techniques and Applications. AUERBACH, 2008.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Den vollen Inhalt der Quelle findenFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Edited by Borko Furht and Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.
Der volle Inhalt der QuelleFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Den vollen Inhalt der Quelle findenFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Den vollen Inhalt der Quelle findenFurht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Den vollen Inhalt der Quelle findenFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Den vollen Inhalt der Quelle findenFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Den vollen Inhalt der Quelle findenTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Den vollen Inhalt der Quelle findenKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Limited, John, 2020.
Den vollen Inhalt der Quelle findenKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Den vollen Inhalt der Quelle findenKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2019.
Den vollen Inhalt der Quelle findenKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Den vollen Inhalt der Quelle findenMcAmis, Monica. Steganographic techniques in cryptography. 2000.
Den vollen Inhalt der Quelle findenSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2012.
Den vollen Inhalt der Quelle findenSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2009.
Den vollen Inhalt der Quelle findenAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenEmerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenRao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer International Publishing AG, 2016.
Den vollen Inhalt der Quelle findenRao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer London, Limited, 2016.
Den vollen Inhalt der Quelle findenAlbastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.
Den vollen Inhalt der Quelle findenAlbastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.
Den vollen Inhalt der Quelle finden