To see the other types of publications on this topic, follow the link: Cryptographic information security tool.

Books on the topic 'Cryptographic information security tool'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cryptographic information security tool.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
2

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 Veliko Tŭrnovo, Bulgaria). Enhancing cryptographic primitives with techniques from error correcting codes. IOS Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marianne, Swanson, and National Institute of Standards and Technology (U.S.), eds. Automated security self-evaluation tool user manual. 2nd ed. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marianne, Swanson, and National Institute of Standards and Technology (U.S.), eds. Automated security self-evaluation tool user manual. 2nd ed. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. Office of Technology Assessment. and Decision Science Consortium Inc, eds. Personalized decision analysis as an expert elicitation tool: An instructive experience in information security policy. The Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Spain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Johansson, and SpringerLink (Online service), eds. Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

David, Hutchison. Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.

Full text
Abstract:
Symmetric encryption algorithms have been successfully used to protect information during transmission on an open channel. The classical approach to the synthesis of modern cryptographic algorithms and cryptographic primitives on which they are based, is the use of mathematical apparatus of Boolean functions. The authors demonstrate that the use to solve this problem of functions of multivalued logic (FML) allows to largely improve the durability of the cryptographic algorithms and to extend the used algebraic structures. On the other hand, the study of functions of multivalued logic in crypto
APA, Harvard, Vancouver, ISO, and other styles
11

Clinton), United States President (1993-2001 :. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

1946-, Clinton Bill, United States. Congress. House. Committee on the Judiciary, and United States. Congress. House. Committee on Government Reform, eds. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

United States. President (1993-2001 : Clinton). A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintext of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Office, General Accounting. Export controls: Information on the decision to revise high performance computer controls : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Information Security Intelligence: Cryptographic Principles & Applications. Cengage Delmar Learning, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Security requirements for cryptographic modules. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Security requirements for cryptographic modules. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

S, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cryptographic and Information Security: Approaches for Images and Videos. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

S, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

S, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

S, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

S, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Martin, Patrick, Selim G. Akl, and Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Adaptive Cryptographic Access Control. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Stapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Stapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Security without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publications, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Cryptographic and Information Security Approaches for Images and Videos: Approaches for Images and Videos. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cryptographic and Information Security Approaches for Images and Videos: Approaches for Images and Videos. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Susanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Susanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Susanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Susanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lindley, Dan. Promoting Peace with Information: Transparency As a Tool of Security Regimes. Princeton University Press, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lindley, Dan. Promoting Peace with Information: Transparency as a Tool of Security Regimes. Princeton University Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Promoting peace with information: Transparency as a tool of security regimes. Princeton University Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Panneervel, P. E-Governance ; A Change Management Tool. Rawat Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

DeSantis, Alfredo. Advances in Cryptology - EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Lecture Notes in Computer Science). Springer, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Patient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Productivity Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Busch, Rebecca Mendoza Saltiel. Patient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Busch, Rebecca Mendoza Saltiel. Patient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Productivity Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Internet terror recruitment and tradecraft: How can we address an evolving tool while protecting free speech? : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, second session, May 26, 2010. U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Baron, Kevin M. Presidential Privilege and the Freedom of Information Act. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474442442.001.0001.

Full text
Abstract:
Executive privilege (EP) as a political tool has created a grey area of constitutional power between the legislative and executive branches. By focusing on the post-WWII political usage of executive privilege, this research utilizes a social learning perspective to examine the power dynamics between Congress and the president when it comes to government secrecy and public information. Social learning provides the framework to understand how the Cold War's creation of the modern American security state led to a paradigm shift in the executive branch. This shift altered the politics of the presi
APA, Harvard, Vancouver, ISO, and other styles
50

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!