To see the other types of publications on this topic, follow the link: Data encryption (Computer science) Polynomials.

Books on the topic 'Data encryption (Computer science) Polynomials'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data encryption (Computer science) Polynomials.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Brute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Serdar, Pehlivanoglu, and SpringerLink (Online service), eds. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Basic methods of cryptography. Cambridge, U.K: Cambridge University Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gunasekera, Sheran. Android Apps Security. Berkeley, CA: Apress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Personal encryption clearly explained. San Diego: AP Professional, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Salomon, David. Data Compression: The Complete Reference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Storer, James A. An Introduction to Data Structures and Algorithms. Boston, MA: Birkhäuser Boston, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jan, Pelzl, ed. Understanding cryptography: A textbook for students and practitioners. Heidelberg: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. New York: Marcel Dekker, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Spendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Xu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

International Business Machines Corporation. International Technical Support Organization, ed. IBM system storage tape encryption solutions. 3rd ed. [Pougkeepsie, NY]: International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Min. Multimedia Data Hiding. New York, NY: Springer New York, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Secure multi-party computation. Amsterdam: IOS Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Koskinen, Jukka Antero. Knapsack sets for cryptography. Lappeenranta, Finland: Lappeenranta University of Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Eli, Biham, and Youssef Amr M, eds. Selected areas in cryptography: 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Menezes, Alfred J. Advances in Cryptology-CRYPT0' 90: Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Brassard, Gilles. Advances in Cryptology -- CRYPTO' 89 Proceedings. New York, NY: Springer-Verlag Berlin Heidelberg, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

McCurley, Kevin S. Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

IBM System i security: Protecting i5/OS data with encryption. [United States?]: IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Giovanni, Motta, ed. Handbook of data compression. 5th ed. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Simovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schulz, Ralph-Hardo. Codierungstheorie: Eine Einfu hrung. 2nd ed. Wiesbaden: Vieweg, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

McLoone, Máire. System-on-Chip Architectures and Implementations for Private-Key Data Encryption. Boston, MA: Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Desktop witness: The do's and don'ts of personal computer security. Chichester: John Wiley & Sons, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Stavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Heidelberg: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Staff, Cisco Learning Institute. Encryption. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Simple Steps to Data Encryption. Syngress Media,U.S., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Satellite Encryption. Academic Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cryptography. New York, USA: McGraw Hill Education, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Everyday Cryptography Fundamental Principles And Applications. Oxford University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gunasekera, Sheran. Android Apps Security. Apress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Multimedia Data Hiding. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography