Books on the topic 'Cryptography Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 35 books for your research on the topic 'Cryptography Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Information Technology Laboratory, National Institute of Standards and Technology, 1997.
Find full textHenzen, Luca. VLSI circuits for cryptographic authentication. Hartung-Gorre Verlag, 2011.
Find full textWaldvogel, Christian P. On the nature of authentication protocols. Hartung-Gorre, 1997.
Find full textTricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Jones & Bartlett Learning, 2011.
Find full textE, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Find full textLyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textNational Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textNational Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textMyasnikov, Alexei G. Non-commutative cryptography and complexity of group-theoretic problems. American Mathematical Society, 2011.
Find full text1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textMartin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.
Full textLennon, Brian. Passwords: Philology, Security, Authentication. Harvard University Press, 2018.
Find full textPei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2006.
Find full textPei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2019.
Find full textBoonkrong, Sirapat. Authentication and Access Control: Practical Cryptography Methods and Tools. Apress L. P., 2020.
Find full textPei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2006.
Find full textAccess Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2013.
Find full textPasswords: Philology, Security, Authentication. Belknap Press: An Imprint of Harvard University Press, 2018.
Find full textMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Full textLab Manual to Accompany Access Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2012.
Find full textChapple, Mike, Tricia Ballad, Bill Ballad, and Erin Banks. Access Control, Authentication, and Public Key Infrastructure: Print Bundle. Jones & Bartlett Learning, LLC, 2013.
Find full textFurht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Find full textAuthentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Fachmedien Wiesbaden GmbH, 2014.
Find full textPape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, 2014.
Find full textPape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2014.
Find full textViega, John, and Matt Messier. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation and More. O'Reilly Media, Incorporated, 2003.
Find full textViega, John, and Matt Messier. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation and More. O'Reilly Media, Incorporated, 2003.
Find full textFederal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textMu, Yi, and Vijay Varadharajan. Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Springer London, Limited, 2003.
Find full textMartin, Keith M. Cryptographic Protocols. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0009.
Full textMartin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.
Full text