Books on the topic 'Cryptographic information security tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cryptographic information security tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textNATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 Veliko Tŭrnovo, Bulgaria). Enhancing cryptographic primitives with techniques from error correcting codes. IOS Press, 2009.
Find full textMarianne, Swanson, and National Institute of Standards and Technology (U.S.), eds. Automated security self-evaluation tool user manual. 2nd ed. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2003.
Find full textMarianne, Swanson, and National Institute of Standards and Technology (U.S.), eds. Automated security self-evaluation tool user manual. 2nd ed. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2003.
Find full textUnited States. Congress. Office of Technology Assessment. and Decision Science Consortium Inc, eds. Personalized decision analysis as an expert elicitation tool: An instructive experience in information security policy. The Office, 1985.
Find full textSpain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.
Find full textThomas, Johansson, and SpringerLink (Online service), eds. Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textDavid, Hutchison. Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Springer Berlin Heidelberg, 2009.
Find full textSokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Full textClinton), United States President (1993-2001 :. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full text1946-, Clinton Bill, United States. Congress. House. Committee on the Judiciary, and United States. Congress. House. Committee on Government Reform, eds. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full textUnited States. President (1993-2001 : Clinton). A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintext of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. U.S. G.P.O., 2009.
Find full textOffice, General Accounting. Export controls: Information on the decision to revise high performance computer controls : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. The Office, 1998.
Find full textInformation Security Intelligence: Cryptographic Principles & Applications. Cengage Delmar Learning, 2003.
Find full textSecurity requirements for cryptographic modules. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2002.
Find full textSecurity requirements for cryptographic modules. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Find full textS, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.
Find full textCryptographic and Information Security: Approaches for Images and Videos. Taylor & Francis Group, 2018.
Find full textS, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.
Find full textS, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2020.
Find full textS, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.
Find full textS, Ramakrishnan. Cryptographic and Information Security Approaches for Images and Videos. Taylor & Francis Group, 2018.
Find full textMartin, Patrick, Selim G. Akl, and Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Find full textCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Find full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textStapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.
Find full textStapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.
Find full textSecurity without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publications, 2018.
Find full textCryptographic and Information Security Approaches for Images and Videos: Approaches for Images and Videos. Taylor & Francis Group, 2023.
Find full textCryptographic and Information Security Approaches for Images and Videos: Approaches for Images and Videos. Taylor & Francis Group, 2023.
Find full textSusanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.
Find full textSusanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.
Find full textSusanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.
Find full textSusanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Apple Academic Press, Incorporated, 2018.
Find full textInformation Security Management Systems: A Novel Framework and Software As a Tool for Compliance with Information Security Standard. Taylor & Francis Group, 2018.
Find full textLindley, Dan. Promoting Peace with Information: Transparency As a Tool of Security Regimes. Princeton University Press, 2021.
Find full textLindley, Dan. Promoting Peace with Information: Transparency as a Tool of Security Regimes. Princeton University Press, 2007.
Find full textPromoting peace with information: Transparency as a tool of security regimes. Princeton University Press, 2007.
Find full textDeSantis, Alfredo. Advances in Cryptology - EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Lecture Notes in Computer Science). Springer, 1995.
Find full textPatient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Productivity Press, 2017.
Find full textBusch, Rebecca Mendoza Saltiel. Patient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Taylor & Francis Group, 2017.
Find full textBusch, Rebecca Mendoza Saltiel. Patient's Healthcare Portfolio: A Practitioner's Guide to Providing Tool for Patients. Productivity Press, 2017.
Find full textInternet terror recruitment and tradecraft: How can we address an evolving tool while protecting free speech? : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, second session, May 26, 2010. U.S. G.P.O., 2010.
Find full textUsing the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. U.S. G.P.O., 2009.
Find full textBaron, Kevin M. Presidential Privilege and the Freedom of Information Act. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474442442.001.0001.
Full textMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Full text