Academic literature on the topic 'COMPUTERS / Security / Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COMPUTERS / Security / Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "COMPUTERS / Security / Cryptography"
Ostrianska, Ye V., M. V. Yesina, and I. D. Gorbenko. "Analysis of views of the European Union on quantum-post-quantum limitations." Radiotekhnika, no. 210 (September 28, 2022): 87–98. http://dx.doi.org/10.30837/rt.2022.3.210.06.
Full textAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Full textBindhu, V. "Cyber Security Analysis for Quantum Computing." Journal of ISMAC 4, no. 2 (2022): 133–42. http://dx.doi.org/10.36548/jismac.2022.2.006.
Full textDrzazga, Bartosz, and Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes." Cryptography 6, no. 2 (2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textKim, Suhri, and Seokhie Hong. "Design and Security Analysis of Cryptosystems." Applied Sciences 13, no. 3 (2023): 1427. http://dx.doi.org/10.3390/app13031427.
Full textKorolyov, V., M. Ogurtsov, and A. Khodzinsky. "Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security." Cybernetics and Computer Technologies, no. 3 (October 27, 2020): 74–84. http://dx.doi.org/10.34229/2707-451x.20.3.7.
Full textCambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, et al. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions." Applied Sciences 11, no. 6 (2021): 2801. http://dx.doi.org/10.3390/app11062801.
Full textSaragi, Dedy Ronald, Janter Manuel Gultom, Jose Andreas Tampubolon, and Indra Gunawan. "Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (2020): 114. http://dx.doi.org/10.30865/json.v1i2.1745.
Full textTripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.
Full textDissertations / Theses on the topic "COMPUTERS / Security / Cryptography"
Lui, W. C. "Security models for authorization, delegation and accountability." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32053745.
Full textLui, W. C., and 雷永祥. "Security models for authorization, delegation and accountability." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32053745.
Full textMagnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Full textKurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.
Full textChan, Kevin Sean. "Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26651.
Full textAl-Ibrahim, Mohamed Hussain. "Source authentication in group communication." Thesis, Electronic version, 2005. http://hdl.handle.net/1959.14/549.
Full textJanardhana, Swamy V. C. "Electronic Access Control Systems: A New Approach." Thesis, Indian Institute of Science, 1994. http://hdl.handle.net/2005/237.
Full textBicakci, Kemal. "On The Efficiency Of Authentication Protocols, Digital Signatures And Their Applications In E-health: A Top-down Approach." Phd thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1101500/index.pdf.
Full textAnderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.
Full textPark, DongGook. "Cryptographic protocols for third generation mobile communication systems." Thesis, Queensland University of Technology, 2001.
Find full textBooks on the topic "COMPUTERS / Security / Cryptography"
1949-, Pieprzyk Josef, ed. Cryptography: An introduction to computer security. Prentice-Hall, 1989.
Find full textNechvatal, James. Public-key cryptography: Computer security. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
Find full textMogollon, Manuel. Cryptography and security services: Mechanisms and applications. CyberTech Pub., 2007.
Find full textNechvatal, James. Public-key cryptography. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
Find full textNechvatal, James. Public-key cryptography. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, 1991.
Find full textNechvatal, James. Public-key cryptography. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, 1991.
Find full textElbirt, Adam J. Understanding and applying cryptography and data security. Auerbach Publications, 2008.
Find full textF, Blake Ian, Seroussi G. 1955-, and Smart Nigel P. 1967-, eds. Advances in elliptic curve cryptography. Cambridge University Press, 2005.
Find full textYehuda, Lindell, ed. Introduction to modern cryptography: Principles and protocols. CRC PRESS, 2007.
Find full textBook chapters on the topic "COMPUTERS / Security / Cryptography"
Li, Shujun, Ahmad-Reza Sadeghi, and Roland Schmitz. "hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14577-3_43.
Full textLi, Shujun, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, and Junaid Jameel Ahmad. "hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27576-0_19.
Full textHofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Full textKizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Full textKizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_11.
Full textKizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_11.
Full textCamp, L. Jean. "Mental Models of Computer Security." In Financial Cryptography. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27809-2_12.
Full textde Alencar, Marcelo Sampaio. "Computer Networks." In Cryptography and Network Security. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-6.
Full textWang, Shuangbao Paul. "Cryptography and Architecture Security." In Computer Architecture and Organization. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5662-0_10.
Full textPieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Group-Oriented Cryptography." In Fundamentals of Computer Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_10.
Full textConference papers on the topic "COMPUTERS / Security / Cryptography"
Pacheco, Rodrigo, Douglas Braga, Iago Passos, Thiago Araújo, Vinícius Lagrota, and Murilo Coutinho. "libharpia: a New Cryptographic Library for Brazilian Elections." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg.2022.224098.
Full textAllam, Ahmed M., Hazem M. Abbas, and M. Watheq El-Kharashi. "Security analysis of neural cryptography implementation." In 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM). IEEE, 2013. http://dx.doi.org/10.1109/pacrim.2013.6625473.
Full textShrivastava, Akash, and Manvendra Singh. "A security enhancement approach in quantum cryptography." In 2012 International Conference on Computers and Devices for Communication (CODEC). IEEE, 2012. http://dx.doi.org/10.1109/codec.2012.6509349.
Full textCangea, Otilia, Carmen Silvia Oprina, and Mihai-Octavian Dima. "Implementing quantum cryptography algorithms for data security." In 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2016. http://dx.doi.org/10.1109/ecai.2016.7861116.
Full textPopa, Diana, and Emil Simion. "Enhancing security by combining biometrics and cryptography." In 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2017. http://dx.doi.org/10.1109/ecai.2017.8166461.
Full textEl Zouka, Heshem A., and Mustafa M. Hosni. "On the power of quantum cryptography and computers." In 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2014. http://dx.doi.org/10.1109/cybersec.2014.6913972.
Full textZhan, Gaofeng, Yong Jiang, Xiaotian Yin, and Shan Li. "Research on security of NB-IoT based on cryptography." In 2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2021. http://dx.doi.org/10.1109/aemcse51986.2021.00247.
Full textPeace Akinduro, Aderonke, Boniface Kayode Alese, Olufunso Dayo Alowolodu, Aderonke Favour-Bethy Thompson, and Akintoba Emmanuel Akinwonmi. "Development of a Secured Shared Processing System." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2156.
Full textMihailescu, Marius iulian, Stefania loredana Nita, and Valentin corneliu Pau. "E-LEARNING SYSTEM FRAMEWORK USING ELLIPTIC CURVE CRYPTOGRAPHY AND SEARCHABLE ENCRYPTION." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-071.
Full textGuimarães, Antonio, Diego F. Aranha, and Edson Borin. "Secure and efficient software implementation of QC-MDPC code-based cryptography." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19272.
Full textReports on the topic "COMPUTERS / Security / Cryptography"
Bixby, Eric R. An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada562021.
Full textData Encryption Standard. National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full text