Books on the topic 'Application encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Application encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Xu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.
Find full textXu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Find full textSpendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.
Find full textservice), SpringerLink (Online, ed. Finite Automata and Application to Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.
Find full textEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Berlin: Springer, 2000.
Find full text1963-, Preneel Bart, ed. Advances in cryptology: EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings. Berlin: Springer, 2000.
Find full textprofesseur, Stern Jacques, ed. Advances in cryptology, EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 : proceedings. Berlin: Springer, 1999.
Find full textSerrão, Carlos. Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
Find full textKaisa, Nyberg, and International Association for Cryptologic Research., eds. Advances in cryptology: EUROCRYPT '98 : International Conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 : proceedings. Berlin: Springer, 1998.
Find full textYi, Xun, Russell Paulet, and Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.
Full textJajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.
Find full textHelleseth, Tor. Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1994.
Find full textRueppel, Rainer A. Advances in Cryptology -- EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1993.
Find full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Find full textTom, Myer, and Southwell Michael G, eds. Pro PHP security: From application security principles to the implementation of XSS defenses. 2nd ed. [Berkeley, CA]: Apress, 2010.
Find full textMaurer, Ueli. Advances in Cryptology -- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1996.
Find full textGollmann, Dieter. Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2010.
Find full textChatterjee, Ayantika, and Khin Mi Mi Aung. Fully Homomorphic Encryption in Real World Applications. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6393-1.
Full textservice), SpringerLink (Online, ed. Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2009.
Find full textXuejia, Lai, and Chen Kefei 1959-, eds. Advances in cryptology - ASIACRYPT 2006: 12th international conference on the theory and application of cryptology and information security Shanghai, China, December 2006, proceedings. Berlin: Springer, 2006.
Find full textAbe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. Berlin, Heidelberg: International Association for Cryptologic Research, 2010.
Find full textFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Find full textWang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textCavallaro, Lorenzo. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textJoye, Marc, and Jean-Jacques Quisquater. Cryptographic Hardware and Embedded Systems - CHES 2004 00: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Berlin: Springer-Verlag Berlin Heidelberg, 2004.
Find full textBanerjee, Santo. Chaos synchronization and cryptography for secure communications: Applications for encryption. Hershey, PA: Information Science Reference, 2010.
Find full textC, Freiling Felix, and SpringerLink (Online service), eds. Information Security: 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textHoepman, Jaap-Henk. Radio Frequency Identification. Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full text1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. New York: Marcel Dekker, 2004.
Find full textLafe, Olu. Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption, and Modeling. Boston, MA: Springer US, 2000.
Find full textChristof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.
Find full textStephen, Wolthusen, and SpringerLink (Online service), eds. Critical Information Infrastructures Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textHelger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textTamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Hershey, PA: Information Science Reference, 2012.
Find full textMogollon, Manuel. Cryptography and security services: Mechanisms and applications. Hershey, PA: CyberTech Pub., 2007.
Find full textDelfs, Hans. Introduction to Cryptography: Principles and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
Find full textKandasamy, W. B. Vasantha. Special classes of set codes and their applications. Ann Arbor: Infolearnquest, 2008.
Find full textKandasamy, W. B. Vasantha. Special classes of set codes and their applications. Ann Arbor: Infolearnquest, 2008.
Find full textMahalingam, Ramkumar, and Akansu Ali N. 1958-, eds. Data hiding fundamentals and applications: Content security in digital media. San Diego, Calif: Elsevier Academic Press, 2004.
Find full textPantelimon, Stănică, and ScienceDirect (Online service), eds. Cryptographic Boolean functions and applications. Amsterdam: Academic Press/Elsevier, 2009.
Find full textMartin, Keith M. Everyday Cryptography: Fundamental Principles and Applications. Oxford: OUP Oxford, 2012.
Find full textPseudorandomness and cryptographic applications. Princeton, NJ: Princeton University Press, 1996.
Find full text1955-, Breithaupt Jim, and Wheeler Ken L. 1955-, eds. Building SET applications for secure transactions. New York: Wiley, 1998.
Find full textPreneel, Bart. Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18, ... (Lecture Notes in Computer Science). Springer, 2000.
Find full text