To see the other types of publications on this topic, follow the link: Encryption techniques.

Books on the topic 'Encryption techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Encryption techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Held, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Griffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wold, Geoffrey H. Computer crime: Techniques, prevention. Bankers Pub. Co., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

EUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Springer-Verlag Berlin Heidelberg, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

NATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

NATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. SPIE, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. SPIE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

name, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. SPIE, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Schmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

EUROCRYPT '97 ( 1997 Konstanz, Germany). Advances in cryptology--EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Johansson, Thomas. Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Riviera), EUROCRYPT (2010 French. Advances in cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rueppel, Rainer A. Advances in Cryptology -- EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings. Springer-Verlag Berlin Heidelberg, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Helleseth, Tor. Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings. Springer-Verlag Berlin Heidelberg, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Multimedia Content Encryption: Techniques and Applications. AUERBACH, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Edited by Borko Furht and Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Furht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Knight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Limited, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Knight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Knight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Knight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

McAmis, Monica. Steganographic techniques in cryptography. 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Swenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Swenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ahmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ahmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ahmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ahmad, Khaleel, M. N. Doja, Nur Izura Udzir, and Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer International Publishing AG, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Rao, Channapragada Rama Seshagiri, and Munaga . V. N. K. Prasad. Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer London, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Albastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Albastaki, Yousif Abdullatif, and Wasan Awad. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!