Books on the topic 'To ensure the security analysis of the algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'To ensure the security analysis of the algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.
Full textservice), SpringerLink (Online, ed. Transactions on Data Hiding and Multimedia Security VII. Springer Berlin Heidelberg, 2012.
Find full textDamgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag Berlin Heidelberg, 1999.
Find full textSteven, Furnell, Theoharidou Marianthi, and SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textHanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textCatuscia, Palamidessi, and SpringerLink (Online service), eds. Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textSahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textBruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textUnited States. General Accounting Office., ed. Army force structure: Attention needed to ensure an ample supply of ready support forces : statement of Richard Davis, Director, National Security Analysis, National Security and International Affairs Division, before the Subcommittee on Military Forces and Personnel, Committee on Armed Services, House of Representatives. The Office, 1993.
Find full textA, Huss Sorin, and SpringerLink (Online service), eds. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textRoshan, Pais Alwyn, Chandrasekaran K, Balakrishnan N, and SpringerLink (Online service), eds. Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textZheng, Jun. Ad Hoc Networks: 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textDaji, Qiao, and SpringerLink (Online service), eds. Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textJianying, Zhou, Li Hui, and SpringerLink (Online service), eds. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textLee, Dong Hoon. Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textPeter, Daniel, and SpringerLink (Online service), eds. Computer Safety, Reliability, and Security: 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textSimone, Fischer-Hübner, Murayama Yuko, Portmann Armand, Rieder Carlos, and SpringerLink (Online service), eds. Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.
Find full textMoti, Yung, and SpringerLink (Online service), eds. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textChristianson, Bruce. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textPascal, Lafourcade, and SpringerLink (Online service), eds. Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textShumilina, Vera, Galina Krohicheva, Nataliya Izvarina, et al. Application of accounting, analysis and audit in enterprise management. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/monography_618ba6f2989171.05397055.
Full textJohansson, Thomas. Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textservice), SpringerLink (Online, ed. Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textChristof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textservice), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.
Find full textKnudsen, Lars. Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textK, Datta Ajoy, Devismes Stéphane, Misra Archan, and SpringerLink (Online service), eds. Distributed Computing and Networking: 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textSomitra, Sanadhya, and SpringerLink (Online service), eds. Security, Privacy, and Applied Cryptography Engineering: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textGrossklags, Jens. Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textAndrzej, Czyżewski, and SpringerLink (Online service), eds. Multimedia Communications, Services and Security: 4th International Conference, MCSS 2011, Krakow, Poland, June 2-3, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textHon, Yuen Tsz, and SpringerLink (Online service), eds. Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textY, Zomaya Albert, Strufe Thorsten, Alcaraz Calero Jose M, Thomas Tony, and SpringerLink (Online service), eds. Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textCristofaro, Emiliano. Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textservice), SpringerLink (Online, ed. Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textKim, Tai-hoon. Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textDegano, Pierpaolo. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Springer Berlin Heidelberg, 2012.
Find full textWang, Xiaoyun. Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textGalbraith, Steven. Progress in Cryptology - INDOCRYPT 2012: 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textChristian, Scheideler, and SpringerLink (Online service), eds. Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textMuhammad, Khan, Kaiser J. Giri, Shabir Ahmad Parah, and Rumaan Bashir. Multimedia Security: Algorithm Development, Analysis and Applications. Springer Singapore Pte. Limited, 2021.
Find full textMultimedia Security: Algorithm Development, Analysis and Applications. Springer Singapore Pte. Limited, 2022.
Find full textStoica, Adrian, Kirk P. Arnett, Tai-hoon Kim, et al. Computer Applications for Security, Control and System Engineering. Springer, 2012.
Find full textConstructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Springer, 2014.
Find full textProuff, Emmanuel. Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Springer London, Limited, 2014.
Find full textProuff, Emmanuel. Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers. Springer London, Limited, 2013.
Find full textGritzalis, Dimitris, Steven Furnell, and Marianthi Theoharidou. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings. Springer Berlin / Heidelberg, 2014.
Find full textYamauchi, Toshihiro, and Goichiro Hanaoka. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings. Springer Berlin / Heidelberg, 2012.
Find full textAdvances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, ... Springer, 2014.
Find full textMalcolm, James, Bruno Crispo, and Bruce Christianson. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer, 2012.
Find full text