Books on the topic 'Data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBlinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Full textHeld, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. Poughkeepsie, NY: IBM, International Technical Support Organization, 2010.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textinc, International Resource Development, ed. Data, text & voice encryption worldwide markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Find full textinc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. New Canaan, Conn: International Resource Development, 1991.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.
Full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textTan, Woei-Wen. Hardware/software codesign of data encryption algorithms. Manchester: UMIST, 1996.
Find full textMulder, Valentin, Alain Mermoud, Vincent Lenders, and Bernhard Tellenbach, eds. Trends in Data Protection and Encryption Technologies. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6.
Full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Find full textThomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. Altamonte Springs, Fla: The Institute of Internal Auditors, 1997.
Find full textXu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.
Find full textXu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Find full textK, Kokula Krishna Hari, ed. Enhancing Security in Dynamic Public Cloud Data Using Encryption. Chennai, India: Association of Scientists, Developers and Faculties, 2016.
Find full textLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textJohannes, Buchmann, and Ding Jintai, eds. Post-quantum cryptography: Second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings. Berlin: Springer, 2008.
Find full textEvangelos, Kranakis, and Van Oorschot Paul C, eds. Selected areas in cryptography. Boston: Kluwer Academic, 1997.
Find full textTamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Hershey, PA: Information Science Reference, 2012.
Find full textStavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Heidelberg: Springer, 2010.
Find full textUnited States. Securities and Exchange Commission. Office of Audits. Evaluation of the SEC encryption program. Washington, D.C: U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, 2010.
Find full textNational Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.
Find full textSimple Steps to Data Encryption:. Elsevier, 2013. http://dx.doi.org/10.1016/c2012-0-06008-5.
Full textTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Find full textGupta, Brij, and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.
Find full textVerma, Mr Shambhulal. Secure Data Communication: Using XML Encryption. CreateSpace Independent Publishing Platform, 2012.
Find full textData Integrity: How Public Key Encryption Ensures Data Integrity. Independently Published, 2022.
Find full textKiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.
Find full textEncryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.
Find full textData, text and voice encryption worldwide markets. New Canaan, Conn., U.S.A. (21 Locust Ave., New Canaan 06840): International Resource Development, 1988.
Find full textCurtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.
Find full text