To see the other types of publications on this topic, follow the link: Application encryption.

Books on the topic 'Application encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Application encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Xu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

service), SpringerLink (Online, ed. Finite Automata and Application to Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

EUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Berlin: Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1963-, Preneel Bart, ed. Advances in cryptology: EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings. Berlin: Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

professeur, Stern Jacques, ed. Advances in cryptology, EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 : proceedings. Berlin: Springer, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Serrão, Carlos. Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaisa, Nyberg, and International Association for Cryptologic Research., eds. Advances in cryptology: EUROCRYPT '98 : International Conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 : proceedings. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yi, Xun, Russell Paulet, and Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Helleseth, Tor. Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rueppel, Rainer A. Advances in Cryptology -- EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tom, Myer, and Southwell Michael G, eds. Pro PHP security: From application security principles to the implementation of XSS defenses. 2nd ed. [Berkeley, CA]: Apress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Maurer, Ueli. Advances in Cryptology -- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gollmann, Dieter. Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chatterjee, Ayantika, and Khin Mi Mi Aung. Fully Homomorphic Encryption in Real World Applications. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6393-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

service), SpringerLink (Online, ed. Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Xuejia, Lai, and Chen Kefei 1959-, eds. Advances in cryptology - ASIACRYPT 2006: 12th international conference on the theory and application of cryptology and information security Shanghai, China, December 2006, proceedings. Berlin: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Abe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. Berlin, Heidelberg: International Association for Cryptologic Research, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cavallaro, Lorenzo. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Joye, Marc, and Jean-Jacques Quisquater. Cryptographic Hardware and Embedded Systems - CHES 2004 00: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Berlin: Springer-Verlag Berlin Heidelberg, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Banerjee, Santo. Chaos synchronization and cryptography for secure communications: Applications for encryption. Hershey, PA: Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

C, Freiling Felix, and SpringerLink (Online service), eds. Information Security: 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hoepman, Jaap-Henk. Radio Frequency Identification. Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. New York: Marcel Dekker, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lafe, Olu. Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption, and Modeling. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Christof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Stephen, Wolthusen, and SpringerLink (Online service), eds. Critical Information Infrastructures Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Helger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Tamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mogollon, Manuel. Cryptography and security services: Mechanisms and applications. Hershey, PA: CyberTech Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Delfs, Hans. Introduction to Cryptography: Principles and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kandasamy, W. B. Vasantha. Special classes of set codes and their applications. Ann Arbor: Infolearnquest, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kandasamy, W. B. Vasantha. Special classes of set codes and their applications. Ann Arbor: Infolearnquest, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mahalingam, Ramkumar, and Akansu Ali N. 1958-, eds. Data hiding fundamentals and applications: Content security in digital media. San Diego, Calif: Elsevier Academic Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pantelimon, Stănică, and ScienceDirect (Online service), eds. Cryptographic Boolean functions and applications. Amsterdam: Academic Press/Elsevier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Martin, Keith M. Everyday Cryptography: Fundamental Principles and Applications. Oxford: OUP Oxford, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Pseudorandomness and cryptographic applications. Princeton, NJ: Princeton University Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

1955-, Breithaupt Jim, and Wheeler Ken L. 1955-, eds. Building SET applications for secure transactions. New York: Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Stephen, Crosier, ed. Securing biometrics applications. London: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tao, Renji. Finite Automata and Application to Cryptography. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Tao, Renji. Finite Automata and Application to Cryptography. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Preneel, Bart. Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18, ... (Lecture Notes in Computer Science). Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography