Books on the topic 'Computer networks Data encryption (Computer science) Computers Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks Data encryption (Computer science) Computers Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
William, Stallings. Practical cryptography for data internetworks. IEEE Computer Society Press, 1996.
Find full textWilliam, Stallings. Cryptography and network security: Principles and practices. 4th ed. Pearson Education, 2006.
Find full textStallings, William. Cryptography and network security: Principles and practice. 5th ed. Prentice Hall, 2011.
Find full textStallings, William. Cryptography and network security: Principles and practice. 4th ed. Pearson/Prentice Hall, 2006.
Find full textDelfs, Hans. Introduction to Cryptography: Principles and Applications. Springer Berlin Heidelberg, 2002.
Find full textWilliam, Stallings. Practical cryptography for internetworks. IEEE Computer Society Press, 1996.
Find full textIshai, Yuval. Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textBiryukov, Alex. Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textElçi, Atilla. Theory and practice of cryptography solutions for secure information systems. Information Science Reference, 2013.
Find full textservice), SpringerLink (Online, ed. Finite Automata and Application to Cryptography. Springer Berlin Heidelberg, 2009.
Find full textDavid, Hutchison. Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textDesmedt, Yvo G. Public Key Cryptography -- PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6-8, 2003 Proceedings. Springer-Verlag Berlin Heidelberg, 2002.
Find full textMicciancio, Daniele. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer Berlin Heidelberg, 2010.
Find full textCatalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textDisappearing cryptography information hiding: Steganography and watermarking. 3rd ed. Morgan Kaufmann Publishers, 2009.
Find full textSion, Radu. Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2010.
Find full textPhilippe, Golle, and SpringerLink (Online service), eds. Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers. Springer Berlin Heidelberg, 2009.
Find full textStephen, Paine, and RSA Security, eds. RSA Security's official guide to cryptography. Osborne/McGraw-Hill, 2001.
Find full textStephen, Paine, and RSA Security, eds. RSA Security's official guide to cryptography. Osborne/McGraw-Hill, 2001.
Find full textJohn, Ioannidis, Keromytis Angelos, and Yung Moti, eds. Applied cryptography and network security: Third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings. Springer, 2005.
Find full textSCN 2010 (2010 Amalfi, Italy). Security and cryptography for networks: 7th international conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings. Springer, 2010.
Find full textInternational Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Springer, 2010.
Find full textRosenberg, Burton. Handbook of financial cryptography and security. Chapman & Hall/CRC, 2011.
Find full textDavid, Hutchison. Public Key Cryptography – PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Springer Berlin Heidelberg, 2009.
Find full textservice), SpringerLink (Online, ed. Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textBernstein, Daniel J. Progress in Cryptology – AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2010.
Find full text1968-, De Prisco Roberto, and SpringerLink (Online service), eds. Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full text1949-, Won Dongho, and Kim Seungjoo, eds. Information security and cryptology: ICISC 2005, 8th international conference, Seoul, Korea, December 1-2, 2005 : revised selected papers. Springer, 2006.
Find full textDavid, Pointcheval, ed. Topics in cryptology: CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings. Springer, 2006.
Find full textInternational Workshop on Security Protocols (14th 2006 Cambridge, England). Security protocols: 14th international workshop, Cambridge, March 27-29 2006, revised selected papers. Edited by Christianson Bruce. Springer, 2009.
Find full textCRYPTO (Conference) (30th 2010 Santa Barbara, Calif.). Advances in cryptology--CRYPTO 2010: 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings. Springer, 2010.
Find full textWilliam, Stallings. Cryptography and network security: Principles and practice. 2nd ed. Prentice Hall, 1999.
Find full textWilliam, Stallings. Cryptography and network security: Principles and practice. 3rd ed. Prentice Hall, 2003.
Find full textFC '98 (Conference) (2nd 1998 Anguilla, British West Indies). Financial Cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings. Springer, 1998.
Find full text1967-, Smart Nigel P., ed. Cryptography and coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings. Springer, 2005.
Find full textChristianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.
Find full textPQCrypto 2010 (2010 Darmstadt, Germany). Post-quantum cryptography: Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings. Springer, 2010.
Find full textMaurer, Ueli. Advances in Cryptology -- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings. Springer-Verlag Berlin Heidelberg, 1996.
Find full textInternational Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.
Find full textservice), SpringerLink (Online, ed. Advances in Cryptology – EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full text1967-, Wright Rebecca N., ed. Financial cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003 : revised papers. Springer, 2003.
Find full textF, Syverson Paul, ed. Financial cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings. Springer, 2002.
Find full textMatthew, Franklin, Hui Lucas Chi-Kwong 1964-, and Wong Duncan S, eds. Cryptology and network security: 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 : proceedings. Springer, 2008.
Find full textLópez, Javier. Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textPascal, Paillier, and Verbauwhede Ingrid, eds. Cryptographic hardware and embedded systems - CHES 2007: 9th international workshop, Vienna, Austria, September 10-13, 2007 ; proceedings. Springer, 2007.
Find full textICITS 2009 (2009 Shizuoka, Japan). Information theoretic security: 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers. Springer, 2010.
Find full textInscrypt 2009 (2009 Beijing, China). Information security and cryptology: 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009 : revised selected papers. Springer, 2010.
Find full textProvSec 2011 (2011 Xi'an, China). Provable security: 5th International Conference, PROVSEC 2011, Xi'an, China, October 16-18, 2011: proceedings. Springer, 2011.
Find full text