To see the other types of publications on this topic, follow the link: Encryption protocols.

Books on the topic 'Encryption protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Encryption protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waldvogel, Christian P. On the nature of authentication protocols. Hartung-Gorre, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

service), SpringerLink (Online, ed. RFID Security and Privacy: Concepts, Protocols, and Architectures. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Christianson, Bruce. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Christianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Workshop on Security Protocols (14th 2006 Cambridge, England). Security protocols: 14th international workshop, Cambridge, March 27-29 2006, revised selected papers. Edited by Christianson Bruce. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Christianson, Bruce. Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christianson, Bruce. Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yehuda, Lindell, ed. Introduction to modern cryptography: Principles and protocols. CRC PRESS, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bellalta, Boris. Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sacchi, Claudio. Multiple Access Communications: 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Peikari, Cyrus. Maximum Wireless Security. Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Miller, Lawrence. CISSP for dummies. 2nd ed. Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

service), SpringerLink (Online, ed. Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research. The Author, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rhee, Man Young. Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Rhee, Man Young. Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Boyd, Colin, Anish Mathuria, and Douglas Stebila. Protocols for Authentication and Key Establishment. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Security Protocols Lecture Notes in Computer Science Security and Cryptology. Springer-Verlag Berlin and Heidelberg GmbH &, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Malcolm, James, and Bruce Christianson. Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Malcolm, James, and Bruce Christianson. Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Matyás, Vashek, Petr Svenda, Frank Stajano, James Malcolm, and Bruce Christianson. Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Stajano, Frank, James Malcolm, Bruce Christianson, Jonathan Anderson, Vashek Matyáš, and Petr Švenda. Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cryptography Algorithms: A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stajano, Frank, Bruce Christianson, Jonathan Anderson, and Vashek Matyáš. Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Brands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Brands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Stajano, Frank, James Malcolm, Bruce Christianson, and Jonathan Anderson. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Yan, and Paris Kitsos. RFID Security: Techniques, Protocols and System-On-Chip Design. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Malcolm, James, Bruno Crispo, and Bruce Christianson. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Implementing Ssltls Using Cryptography And Pki. Wiley Publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Stajano, Frank, James Malcolm, and Bruce Christianson. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Malcolm, James A., Michael Roe, Bruce Christianson, and Vashek Matyáš. Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Engineering Secure Twoparty Computation Protocols Design Optimization And Applications Of Efficient Secure Function Evaluation. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Security Protocols 13th International Workshop Cambridge Uk April 2022 2005 Revised Selected Papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lindell, Yehuda, and Jonathan Katz. Introduction to Modern Cryptography: Principles and Protocols. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Vinel, Alexey, Boris Bellalta, Magnus Jonsson, Marina Ninoslav, Dimitrova Desislava, and Dieter Fiems. Multiple Access Communications: 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013, Proceedings. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Vinel, Alexey, Boris Bellalta, Magnus Jonsson, and Evgeny Belyaev. Multiple Access Communications: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tirkkonen, Olav, Alexey Vinel, Boris Bellalta, and Magnus Jonsson. Multiple Access Communications: 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings. Springer London, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Vinel, Alexey, Boris Bellalta, Magnus Jonsson, Jaume Barcelo, and Roman Maslennikov. Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings. Springer Berlin / Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Vinel, Alexey, Boris Bellalta, Magnus Jonsson, Marina Ninoslav, and Dimitrova Desislava. Multiple Access Communications: 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013, Proceedings. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tirkkonen, Olav, Alexey Vinel, Boris Bellalta, and Magnus Jonsson. Multiple Access Communications: 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings. Springer International Publishing AG, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vinel, Alexey, Claudio Sacchi, Boris Bellalta, Miklos Telek, and Andrey Lyakhov. Multiple Access Communications: Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, Proceedings. Springer London, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Multiple Access Communications: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings. Springer International Publishing AG, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

The New Era Of Exponential Encryption: - Beyond Cryptographic Routing with the Echo Protocol [Paperback]. Books on Demand, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Peikari, Cyrus, and Seth Fogie. Maximum Wireless Security. Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!