To see the other types of publications on this topic, follow the link: To ensure the security analysis of the algorithm.

Books on the topic 'To ensure the security analysis of the algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'To ensure the security analysis of the algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.

Full text
Abstract:
The monograph examines the main directions of the organization and legal regulation of the interaction of law enforcement agencies in the activities to ensure the national security of the Russian state. Special attention is paid to the important characteristics of the constituent elements of national security, theoretical and methodological aspects of the formation of the mechanism of interaction of law enforcement agencies to ensure state and public security and law and order, as well as the analysis of improving the effectiveness of the practical activities of law enforcement agencies in the system of measures to protect the rights and freedoms of the individual, the priority interests of society and the state using modern models of network (digital) interaction.
 The system of ensuring national security, its forces and means is characterized. Extreme threats and risks to national security within the framework of geopolitical changes in the modern world are shown.
 It is of interest to specialists of various branches of knowledge interested in security issues.
APA, Harvard, Vancouver, ISO, and other styles
2

service), SpringerLink (Online, ed. Transactions on Data Hiding and Multimedia Security VII. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steven, Furnell, Theoharidou Marianthi, and SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Catuscia, Palamidessi, and SpringerLink (Online service), eds. Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. General Accounting Office., ed. Army force structure: Attention needed to ensure an ample supply of ready support forces : statement of Richard Davis, Director, National Security Analysis, National Security and International Affairs Division, before the Subcommittee on Military Forces and Personnel, Committee on Armed Services, House of Representatives. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, Huss Sorin, and SpringerLink (Online service), eds. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Roshan, Pais Alwyn, Chandrasekaran K, Balakrishnan N, and SpringerLink (Online service), eds. Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Jun. Ad Hoc Networks: 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Daji, Qiao, and SpringerLink (Online service), eds. Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jianying, Zhou, Li Hui, and SpringerLink (Online service), eds. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Dong Hoon. Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Peter, Daniel, and SpringerLink (Online service), eds. Computer Safety, Reliability, and Security: 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Simone, Fischer-Hübner, Murayama Yuko, Portmann Armand, Rieder Carlos, and SpringerLink (Online service), eds. Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Moti, Yung, and SpringerLink (Online service), eds. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Christianson, Bruce. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pascal, Lafourcade, and SpringerLink (Online service), eds. Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shumilina, Vera, Galina Krohicheva, Nataliya Izvarina, et al. Application of accounting, analysis and audit in enterprise management. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/monography_618ba6f2989171.05397055.

Full text
Abstract:
It is impractical to plan the further work of the company without taking into account analytical data for previous production periods. Analytical accounting data allows managers to build a company's strategy or make changes to an existing development plan. The importance of accounting for the enterprise plays a large role at the planning stage of the further business strategy. A competent manager studies accounting data before making the next decision regarding the company's finances. The easiest way to streamline accounting documents and eliminate errors in it is to conduct an internal audit. Such an audit will protect the company from possible fines and problems with tax audits. It will help optimize accounting and document flow, and simplify relations with banks and counterparties. Economic analysis aims to turn economic and non-economic information into useful information for decision making. Logical processing, study, generalization of facts, their systematization, conclusions, proposals, search for reserves - all these tasks are solved within the framework of economic analysis, which is designed to ensure the validity of management decisions and increase its effectiveness.
 This monograph is a collective work of teachers and students of the Department of Economic Security, Accounting and Law of the Don State Technical University. It is devoted to the consideration of certain issues of accounting, audit and economic analysis at the enterprise in modern conditions.
APA, Harvard, Vancouver, ISO, and other styles
22

Johansson, Thomas. Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

service), SpringerLink (Online, ed. Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Christof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

service), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Knudsen, Lars. Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

K, Datta Ajoy, Devismes Stéphane, Misra Archan, and SpringerLink (Online service), eds. Distributed Computing and Networking: 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Somitra, Sanadhya, and SpringerLink (Online service), eds. Security, Privacy, and Applied Cryptography Engineering: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Grossklags, Jens. Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Andrzej, Czyżewski, and SpringerLink (Online service), eds. Multimedia Communications, Services and Security: 4th International Conference, MCSS 2011, Krakow, Poland, June 2-3, 2011. Proceedings. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hon, Yuen Tsz, and SpringerLink (Online service), eds. Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Y, Zomaya Albert, Strufe Thorsten, Alcaraz Calero Jose M, Thomas Tony, and SpringerLink (Online service), eds. Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cristofaro, Emiliano. Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

service), SpringerLink (Online, ed. Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Tai-hoon. Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Degano, Pierpaolo. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Galbraith, Steven. Progress in Cryptology - INDOCRYPT 2012: 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Christian, Scheideler, and SpringerLink (Online service), eds. Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Muhammad, Khan, Kaiser J. Giri, Shabir Ahmad Parah, and Rumaan Bashir. Multimedia Security: Algorithm Development, Analysis and Applications. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Multimedia Security: Algorithm Development, Analysis and Applications. Springer Singapore Pte. Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Transactions On Data Hiding And Multimedia Security Vi. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Stoica, Adrian, Kirk P. Arnett, Tai-hoon Kim, et al. Computer Applications for Security, Control and System Engineering. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Prouff, Emmanuel. Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Prouff, Emmanuel. Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gritzalis, Dimitris, Steven Furnell, and Marianthi Theoharidou. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings. Springer Berlin / Heidelberg, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yamauchi, Toshihiro, and Goichiro Hanaoka. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings. Springer Berlin / Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, ... Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Malcolm, James, Bruno Crispo, and Bruce Christianson. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!