Books on the topic 'Encryption protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.
Find full textWaldvogel, Christian P. On the nature of authentication protocols. Hartung-Gorre, 1997.
Find full textservice), SpringerLink (Online, ed. RFID Security and Privacy: Concepts, Protocols, and Architectures. Springer-Verlag Berlin Heidelberg, 2008.
Find full textChristianson, Bruce. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.
Find full textChristianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.
Find full textInternational Workshop on Security Protocols (14th 2006 Cambridge, England). Security protocols: 14th international workshop, Cambridge, March 27-29 2006, revised selected papers. Edited by Christianson Bruce. Springer, 2009.
Find full textBruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textChristianson, Bruce. Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textChristianson, Bruce. Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textYehuda, Lindell, ed. Introduction to modern cryptography: Principles and protocols. CRC PRESS, 2007.
Find full textBellalta, Boris. Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textSacchi, Claudio. Multiple Access Communications: 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textservice), SpringerLink (Online, ed. Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research. The Author, 2011.
Find full textRhee, Man Young. Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley & Sons, Incorporated, John, 2003.
Find full textRhee, Man Young. Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley & Sons, Incorporated, John, 2007.
Find full textBoyd, Colin, Anish Mathuria, and Douglas Stebila. Protocols for Authentication and Key Establishment. Springer, 2019.
Find full textSecurity Protocols Lecture Notes in Computer Science Security and Cryptology. Springer-Verlag Berlin and Heidelberg GmbH &, 2014.
Find full textMalcolm, James, and Bruce Christianson. Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Springer London, Limited, 2014.
Find full textMalcolm, James, and Bruce Christianson. Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Springer, 2014.
Find full textMatyás, Vashek, Petr Svenda, Frank Stajano, James Malcolm, and Bruce Christianson. Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers. Springer London, Limited, 2014.
Find full textStajano, Frank, James Malcolm, Bruce Christianson, Jonathan Anderson, Vashek Matyáš, and Petr Švenda. Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers. Springer, 2014.
Find full textCryptography Algorithms: A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption. de Gruyter GmbH, Walter, 2022.
Find full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textStajano, Frank, Bruce Christianson, Jonathan Anderson, and Vashek Matyáš. Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Springer, 2017.
Find full textBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Find full textBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Find full textStajano, Frank, James Malcolm, Bruce Christianson, and Jonathan Anderson. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer, 2012.
Find full textZhang, Yan, and Paris Kitsos. RFID Security: Techniques, Protocols and System-On-Chip Design. Springer, 2010.
Find full textMalcolm, James, Bruno Crispo, and Bruce Christianson. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer, 2012.
Find full textStajano, Frank, James Malcolm, and Bruce Christianson. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer, 2012.
Find full textMalcolm, James A., Michael Roe, Bruce Christianson, and Vashek Matyáš. Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer, 2013.
Find full textEngineering Secure Twoparty Computation Protocols Design Optimization And Applications Of Efficient Secure Function Evaluation. Springer, 2012.
Find full textSecurity Protocols 13th International Workshop Cambridge Uk April 2022 2005 Revised Selected Papers. Springer, 2008.
Find full textLindell, Yehuda, and Jonathan Katz. Introduction to Modern Cryptography: Principles and Protocols. Taylor & Francis Group, 2012.
Find full textVinel, Alexey, Boris Bellalta, Magnus Jonsson, Marina Ninoslav, Dimitrova Desislava, and Dieter Fiems. Multiple Access Communications: 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013, Proceedings. Springer, 2013.
Find full textVinel, Alexey, Boris Bellalta, Magnus Jonsson, and Evgeny Belyaev. Multiple Access Communications: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings. Springer London, Limited, 2014.
Find full textTirkkonen, Olav, Alexey Vinel, Boris Bellalta, and Magnus Jonsson. Multiple Access Communications: 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings. Springer London, Limited, 2015.
Find full textVinel, Alexey, Boris Bellalta, Magnus Jonsson, Jaume Barcelo, and Roman Maslennikov. Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings. Springer Berlin / Heidelberg, 2012.
Find full textVinel, Alexey, Boris Bellalta, Magnus Jonsson, Marina Ninoslav, and Dimitrova Desislava. Multiple Access Communications: 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013, Proceedings. Springer London, Limited, 2013.
Find full textTirkkonen, Olav, Alexey Vinel, Boris Bellalta, and Magnus Jonsson. Multiple Access Communications: 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings. Springer International Publishing AG, 2015.
Find full textVinel, Alexey, Claudio Sacchi, Boris Bellalta, Miklos Telek, and Andrey Lyakhov. Multiple Access Communications: Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, Proceedings. Springer London, Limited, 2010.
Find full textMultiple Access Communications: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings. Springer International Publishing AG, 2014.
Find full textCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Find full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textThe New Era Of Exponential Encryption: - Beyond Cryptographic Routing with the Echo Protocol [Paperback]. Books on Demand, 2019.
Find full text