Books on the topic 'Message cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 35 books for your research on the topic 'Message cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
E, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.
Find full textMarvin, Miller. Codemaster #2: How to write and decode More secret messages. Scholastic, 2005.
Find full textMarvin, Miller. Codemaster #2: How to write and decode more top-secret messages. Scholastic, 2005.
Find full textMarvin, Miller. Codemaster: How to write and decode secret messages. Scholastic, 1998.
Find full textLunde, Paul. The secrets of codes: [understanding the world of hidden messages]. Weldon Owen, 2012.
Find full textMarvin, Miller. Codemaster #1: How to write and decode secret messages. Scholastic, 1998.
Find full textBlackwood, Gary. Mysterious messages: A history of codes and ciphers. Scholastic, 2010.
Find full textAshton, Christina. Codes & ciphers: Hundreds ofunusual and secret ways to send messages. Betterway Books, 1993.
Find full textAshton, Christina. Codes & ciphers: Hundreds of unusual and secret ways to send messages. Betterway Books, 1993.
Find full textMarvin, Miller. Codemaster: How to write and decode secret messages. Scholastic, 1998.
Find full textWrixon, Fred B. Codes, ciphers & other cryptic & clandestine communication: Making and breaking secret messages from hieroglyphs to the Internet. Black Dog & Leventhal Publishers, 1998.
Find full textMarvin, Miller. Codemaster #1: How to write and decode top-secret messages. Scholastic, 1998.
Find full textClinton), United States President (1993-2001 :. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full text1946-, Clinton Bill, United States. Congress. House. Committee on the Judiciary, and United States. Congress. House. Committee on Government Reform, eds. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full textUnited States. President (1993-2001 : Clinton). A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintext of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.
Find full textBrandreth, Gyles. Writing Secret Codes and Sending Hidden Messages. Sterling Publishing Co., Inc., 1986.
Find full textThe secrets of codes: Understanding the world of hidden messages. A. & C. Black, 2009.
Find full textMarvin, Miller. Codemaster #2: How to Write and Decode Secret Messages. Scholastic, 1998.
Find full textMarvin, Miller. Codemaster #1: How to write and decode secret messages. Scholastic, 1998.
Find full textThe book of codes: Understanding the world of hidden messages : an illustrated guide to signs, symbols, ciphers, and secret languages. University of California Press, 2009.
Find full textMartin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.
Full textHunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Jack and Max Stalwart Adventure Series. Running Press, 2017.
Find full textHunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.
Find full textHunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.
Find full textHunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.
Find full textSingh, Simon. Codici & segreti. La storia affascinante dei messaggi cifrati dall'antico Egitto a Internet. BUR Biblioteca Univ. Rizzoli, 2001.
Find full text(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.
Find full textForouzan, Behrouz A. Data Communications Networking (McGraw-Hill Forouzan Networking). 4th ed. McGraw-Hill Science/Engineering/Math, 2006.
Find full text