To see the other types of publications on this topic, follow the link: Secret-key cryptography.

Books on the topic 'Secret-key cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 books for your research on the topic 'Secret-key cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Warner, Penny. The secret of the skeleton key. Egmont USA, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Galbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Scholarly Resources Inc., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

QUANTUM CRYPTOGRAPHY AND SECRET-KEY DISTILLATION. CAMBRIDGE UNIV PRESS, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Galbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Galbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Downing, Taylor. Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Little, Brown Book Group Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Secret warriors: Key scientists, code breakers and propagandists of the Great War. Little, Brown, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Noiseless steganography: The key to covert communications. Auerbach Publications, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gaivoronski, Alexei A., Pavel S. Knopov, Vladimir I. Norkin, and Volodymyr A. Zaslavskyi. Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo.

Full text
Abstract:
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection is a thorough exploration of mathematical models and tools that are designed to strengthen critical infrastructures against threats – both natural and adversarial. Divided into two volumes, this first volume examines stochastic modeling across key economic sectors and their interconnections, while the second volume focuses on advanced mathematical methods for enhancing infrastructure protection. The book covers a range of themes, including risk assessment techniques that account for systemic interdependencies w
APA, Harvard, Vancouver, ISO, and other styles
22

(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!