To see the other types of publications on this topic, follow the link: Encryption (Computer science).

Books on the topic 'Encryption (Computer science)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Encryption (Computer science).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Marcia S. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biham, Eli. Differential cryptanalysis of the data encryption standard. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. The Institute of Internal Auditors, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gunasekera, Sheran. Android Apps Security. Apress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Evangelos, Kranakis, and Van Oorschot Paul C, eds. Selected areas in cryptography. Kluwer Academic, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Stavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

National Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mogollon, Manuel. Cryptography and security services: Mechanisms and applications. CyberTech Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Foundation, Electronic Frontier, ed. Cracking DES: Secrets of encryption research, wiretap politics & chip design. Electronic Frontier Foundation, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Johannes, Buchmann, and Ding Jintai, eds. Post-quantum cryptography: Second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Stefan, Lucks, Sadeghi Ahmad-Reza, and Wolf Christopher, eds. Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

National Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Brassard, Gilles. Advances in Cryptology -- CRYPTO' 89 Proceedings. Springer-Verlag Berlin Heidelberg, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Springer-Verlag Berlin Heidelberg, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Menezes, Alfred J. Advances in Cryptology-CRYPT0' 90: Proceedings. Springer-Verlag Berlin Heidelberg, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

McCurley, Kevin S. Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997. Springer-Verlag Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

A, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stamp, Mark. Applied cryptanalysis: Breaking ciphers in the real world. John Wiley & Sons, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Staff, Cisco Learning Institute. Encryption. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Robshaw, Matt. Fast Software Encryption. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Simple Steps to Data Encryption. Syngress Media,U.S., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

author, Nelson Sharon D., Simek John W. author, and American Bar Association. Law Practice Management Division, eds. Encryption made simple for lawyers. American Bar Association, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Satellite Encryption. Academic Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Curtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Curtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hashing in Computer Science. Wiley & Sons Canada, Limited, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Daemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: AES - the Advanced Encryption Standard. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Martin. Introduction to Identity-Based Encryption. Artech House Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Encryption facility for z/OS V1.2 OpenPGP support. International Business Machines Corporation, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Data breach and encryption handbook. American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!