Books on the topic 'Encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Find full textHeld, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Find full textGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.
Find full textSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Find full textShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.
Find full textEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.
Find full textChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Springer-Verlag Berlin Heidelberg, 1988.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. SPIE, 1998.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. SPIE, 2001.
Find full textname, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. SPIE, 2003.
Find full textSchmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2010.
Find full textYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.
Find full textEUROCRYPT '97 ( 1997 Konstanz, Germany). Advances in cryptology--EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings. Springer, 1997.
Find full textJohansson, Thomas. Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textRiviera), EUROCRYPT (2010 French. Advances in cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings. Springer, 2010.
Find full textRueppel, Rainer A. Advances in Cryptology -- EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings. Springer-Verlag Berlin Heidelberg, 1993.
Find full textHelleseth, Tor. Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. Springer-Verlag Berlin Heidelberg, 1994.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Edited by Borko Furht and Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.
Full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Limited, John, 2020.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2019.
Find full textKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Find full textSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2012.
Find full textSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2009.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textAhmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Find full textRao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer International Publishing AG, 2016.
Find full textRao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer London, Limited, 2016.
Find full textAlbastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.
Find full textAlbastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.
Find full text