Books on the topic 'Software cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Software cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Wootten, David Raiman. A graphic user interface for rapid integration of steganography software. Naval Postgraduate School, 1996.
Find full textMicciancio, Daniele. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer Berlin Heidelberg, 2010.
Find full textIshai, Yuval. Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textDesmedt, Yvo G. Public Key Cryptography -- PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6-8, 2003 Proceedings. Springer-Verlag Berlin Heidelberg, 2002.
Find full textSahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textCatalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textservice), SpringerLink (Online, ed. Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textUnited, States Congress House Committee on Foreign Affairs Subcommittee on Economic Policy Trade and Environment. Export controls on mass market software: Hearing before the Subcommittee on Economic Policy, Trade, and Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Third Congress, first session, October 12, 1993. U.S. G.P.O., 1994.
Find full textJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Addison-Wesley, 2009.
Find full textDavid, Hutchison. Public Key Cryptography – PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Springer Berlin Heidelberg, 2009.
Find full textInternational Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Springer, 2010.
Find full textJohannes, Buchmann, Manulis Mark, and SpringerLink (Online service), eds. Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textInternational Conference on Pairing-Based Cryptography (2nd 2008 Egham, England). Pairing-based cryptography - Pairing 2008: Second international conference, Egham, UK, September 1-3, 2008 ; proceedings. Springer, 2008.
Find full textDavid, Hutchison. Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textBiryukov, Alex. Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textInternational Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.
Find full textWim, Van Dam. Theory of Quantum Computation, Communication, and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textPQCrypto 2010 (2010 Darmstadt, Germany). Post-quantum cryptography: Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings. Springer, 2010.
Find full textSCN 2010 (2010 Amalfi, Italy). Security and cryptography for networks: 7th international conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings. Springer, 2010.
Find full textChristianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.
Find full textPieprzyk, Josef. Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2010.
Find full textLópez, Javier. Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textservice), SpringerLink (Online, ed. Topics in Cryptology – CT-RSA 2008: The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textFischer-Hübner, Simone. Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings. Authors, 2011.
Find full textKnudsen, Lars. Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textProvSec 2011 (2011 Xi'an, China). Provable security: 5th International Conference, PROVSEC 2011, Xi'an, China, October 16-18, 2011: proceedings. Springer, 2011.
Find full textSomitra, Sanadhya, and SpringerLink (Online service), eds. Security, Privacy, and Applied Cryptography Engineering: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textKiayias, Aggelos. Topics in Cryptology – CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textAbe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. International Association for Cryptologic Research, 2010.
Find full textIwama, Kazuo. Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textSerge, Vaudenay, and SpringerLink (Online service), eds. Selected Areas in Cryptography: 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textservice), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.
Find full textInternational Conference in Cryptology in India (11th 2010 Hyderabad, India). Progress in cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings. Springer, 2010.
Find full textICITS 2011 (2011 Amsterdam, Netherlands). Information theoretic security: 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 : proceedings. Springer, 2011.
Find full textservice), SpringerLink (Online, ed. Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full text1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textICITS 2009 (2009 Shizuoka, Japan). Information theoretic security: 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers. Springer, 2010.
Find full textInscrypt 2009 (2009 Beijing, China). Information security and cryptology: 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009 : revised selected papers. Springer, 2010.
Find full textSpain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.
Find full textYalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2010.
Find full textMcAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. CRC Press, 2016. http://dx.doi.org/10.1201/9781439825716.
Full textMcAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.
Find full textMcAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.
Find full text