To see the other types of publications on this topic, follow the link: Data encryption.

Books on the topic 'Data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

National Bureau of Standards. Data encryption standard. U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

inc, International Resource Development, ed. Data, text & voice encryption worldwide markets. International Resource Development, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

inc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. International Resource Development, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adir, Allon, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, and Omri Soceanu. Homomorphic Encryption for Data Science (HE4DS). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65494-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Keshav, and Bishwajeet Kumar Pandey. Next Generation Mechanisms for Data Encryption. CRC Press, 2024. https://doi.org/10.1201/9781003508632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Smith, Marcia S. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Biham, Eli. Differential cryptanalysis of the data encryption standard. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tan, Woei-Wen. Hardware/software codesign of data encryption algorithms. UMIST, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mulder, Valentin, Alain Mermoud, Vincent Lenders, and Bernhard Tellenbach, eds. Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Thomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. The Institute of Internal Auditors, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

K, Kokula Krishna Hari, ed. Enhancing Security in Dynamic Public Cloud Data Using Encryption. Association of Scientists, Developers and Faculties, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Johannes, Buchmann, and Ding Jintai, eds. Post-quantum cryptography: Second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Evangelos, Kranakis, and Van Oorschot Paul C, eds. Selected areas in cryptography. Kluwer Academic, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Tamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wu, Min. Multimedia Data Hiding. Springer New York, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

United States. Securities and Exchange Commission. Office of Audits. Evaluation of the SEC encryption program. U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

National Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bootyman, David. Data encryption. 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Staff, Cisco Learning Institute. Encryption. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Simple Steps to Data Encryption:. Elsevier, 2013. http://dx.doi.org/10.1016/c2012-0-06008-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Data breach and encryption handbook. American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Simple Steps to Data Encryption. Syngress Media,U.S., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gupta, Brij, and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Verma, Mr Shambhulal. Secure Data Communication: Using XML Encryption. CreateSpace Independent Publishing Platform, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Data Integrity: How Public Key Encryption Ensures Data Integrity. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Satellite Encryption. Academic Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Data, text and voice encryption worldwide markets. International Resource Development, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!