Books on the topic 'Cryptography and Information Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cryptography and Information Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Pasalic, Enes, and Lars R. Knudsen, eds. Cryptography and Information Security in the Balkans. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29172-7.
Full textOrs, Berna, and Bart Preneel, eds. Cryptography and Information Security in the Balkans. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21356-9.
Full textWayner, Peter. Disappearing cryptography: Information hiding : steganography & watermarking. 2nd ed. Morgan Kaufmann, 1996.
Find full text1962-, Forcinito Mario, ed. Cryptography, information theory, and error-correction: A handbook for the 21st century. John Wiley, 2005.
Find full textde, Leeuw Karl, and Bergstra J. A, eds. The history of information security: A comprehensive handbook. Elsevier, 2007.
Find full textKanade, Sanjay G., Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-02335-4.
Full textKanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. Morgan & Claypool, 2012.
Find full textElçi, Atilla. Theory and practice of cryptography solutions for secure information systems. Information Science Reference, 2013.
Find full textR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. M. Dekker, 2000.
Find full textR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. M. Dekker, 2000.
Find full text1958-, Nemati Hamid R., and Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Information Science Reference, 2010.
Find full textICISC 2000 (2000 Seoul, Korea). Information security and cryptology: ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings. Springer, 2001.
Find full textPachghare, V. K. Cryptography and Information Security. Prentice Hall India Pvt., Limited, 2020.
Find full textPachghare, V. K. Cryptography and Information Security. Prentice Hall India Pvt., Limited, 2015.
Find full textPor, Lip Yee, and Abdullah Khan, eds. Cryptography and Information Security. MDPI, 2024. http://dx.doi.org/10.3390/books978-3-7258-0898-4.
Full textHerzberg, Amir. Security Information Economy with Cryptography. Pearson Education, Limited, 2010.
Find full textApplebaum, Benny. Information Security and Cryptography: Cryptography in Constant Parallel Time. Springer London, Limited, 2013.
Find full textCryptography in Constant Parallel Time Information Security and Cryptography. Springer, 2012.
Find full textCryptography, Information Theory, and Error-Correction. Wiley & Sons Canada, Limited, John, 2013.
Find full textIntroduction to Cryptography: Principles and Applications (Information Security and Cryptography). 2nd ed. Springer, 2007.
Find full textSadkhan, Sattar B., and Nidaa A. Abbas. Multidisciplinary Perspectives in Cryptology and Information Security. IGI Global, 2014.
Find full textBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Find full textBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Find full textCryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.
Full textBöhme, Rainer. Advanced Statistical Steganalysis (Information Security and Cryptography). Springer, 2010.
Find full textAdvanced Statistical Steganalysis Information Security and Cryptography. Springer, 2010.
Find full textSecurity Privacy And Applied Cryptography Engineering Third. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.
Find full textTowards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography). Springer, 2010.
Find full textKatzenbeisser, Stefan. Recent Advances in RSA Cryptography (Advances in Information Security). Springer, 2001.
Find full textEasttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2022.
Find full textEasttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2020.
Find full textEasttom, William. Modern Cryptography: Applied Mathematics for Encryption and Information Security. Springer International Publishing AG, 2022.
Find full textModern cryptography: Applied mathematics for encryption and information security. McGraw-Hill Education, 2016.
Find full textWayner, Peter. Disappearing Cryptography : Information Hiding: Steganography and Watermarking. Elsevier Science & Technology Books, 2009.
Find full textWayner, Peter. Disappearing Cryptography : Information Hiding: Steganography and Watermarking. Elsevier Science & Technology Books, 2002.
Find full textMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Full textKanade, Sanjay, Dijana Petrovska-Delacretaz, and Bernadette Dorizzi. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Springer International Publishing AG, 2012.
Find full text2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022.
Find full textForcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.
Find full textForcinito, Mario A., and Aiden A. Bruen. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2011.
Find full textBruen, Aiden, and Mario A. Forcinito. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley-Interscience, 2004.
Find full textForcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.
Find full textForcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.
Find full textForcinito, Mario A., Aiden A. Bruen, and James M. McQuillan. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2021.
Find full textForcinito, Mario A., and Aiden A. Bruen. Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. Wiley & Sons, Incorporated, John, 2011.
Find full text