To see the other types of publications on this topic, follow the link: Cryptography and Information Security.

Books on the topic 'Cryptography and Information Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cryptography and Information Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Pasalic, Enes, and Lars R. Knudsen, eds. Cryptography and Information Security in the Balkans. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29172-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ors, Berna, and Bart Preneel, eds. Cryptography and Information Security in the Balkans. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21356-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wayner, Peter. Disappearing cryptography: Information hiding : steganography & watermarking. 2nd ed. Morgan Kaufmann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1962-, Forcinito Mario, ed. Cryptography, information theory, and error-correction: A handbook for the 21st century. John Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Katzenbeisser, Stefan. Recent Advances in RSA Cryptography. Springer US, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

de, Leeuw Karl, and Bergstra J. A, eds. The history of information security: A comprehensive handbook. Elsevier, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kanade, Sanjay G., Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-02335-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. Morgan & Claypool, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elçi, Atilla. Theory and practice of cryptography solutions for secure information systems. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

R, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. M. Dekker, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

R, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. M. Dekker, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

1958-, Nemati Hamid R., and Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

ICISC 2000 (2000 Seoul, Korea). Information security and cryptology: ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings. Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Stamp, Mark. Information Security. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pachghare, V. K. Cryptography and Information Security. Prentice Hall India Pvt., Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pachghare, V. K. Cryptography and Information Security. Prentice Hall India Pvt., Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Por, Lip Yee, and Abdullah Khan, eds. Cryptography and Information Security. MDPI, 2024. http://dx.doi.org/10.3390/books978-3-7258-0898-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Herzberg, Amir. Security Information Economy with Cryptography. Pearson Education, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Applebaum, Benny. Information Security and Cryptography: Cryptography in Constant Parallel Time. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cryptography in Constant Parallel Time Information Security and Cryptography. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cryptography, Information Theory, and Error-Correction. Wiley & Sons Canada, Limited, John, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Introduction to Cryptography: Principles and Applications (Information Security and Cryptography). 2nd ed. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sadkhan, Sattar B., and Nidaa A. Abbas. Multidisciplinary Perspectives in Cryptology and Information Security. IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Böhme, Rainer. Advanced Statistical Steganalysis (Information Security and Cryptography). Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Advanced Statistical Steganalysis Information Security and Cryptography. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Security Privacy And Applied Cryptography Engineering Third. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography). Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sion, Radu. Financial Cryptography and Data Security. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Katzenbeisser, Stefan. Recent Advances in RSA Cryptography (Advances in Information Security). Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Easttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Easttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Easttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Modern cryptography: Applied mathematics for encryption and information security. McGraw-Hill Education, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wayner, Peter. Disappearing Cryptography : Information Hiding: Steganography and Watermarking. Elsevier Science & Technology Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wayner, Peter. Disappearing Cryptography : Information Hiding: Steganography and Watermarking. Elsevier Science & Technology Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
APA, Harvard, Vancouver, ISO, and other styles
40

Kanade, Sanjay, Dijana Petrovska-Delacretaz, and Bernadette Dorizzi. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Springer International Publishing AG, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Desmedt, Yvo. Information Theoretic Security. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Coding Theory and Cryptography: The Essentials. CRC Press LLC, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Forcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Forcinito, Mario A., and Aiden A. Bruen. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bruen, Aiden, and Mario A. Forcinito. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley-Interscience, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Forcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Forcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Forcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Forcinito, Mario A., and Aiden A. Bruen. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography