Libros sobre el tema "Encryption"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Encryption".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Texto completoWheeler, David. Block encryption. University of Cambridge Computer Laboratory, 1987.
Buscar texto completoRen, Kui, and Cong Wang. Searchable Encryption. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Texto completoKoç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Texto completoBiryukov, Alex, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Texto completoCanteaut, Anne, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Texto completoLeander, Gregor, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Texto completoPreneel, Bart, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Texto completoGollmann, Dieter, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Texto completoChatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Texto completoDunkelman, Orr, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9.
Texto completoGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen, and Bruce Schneier, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7.
Texto completoCid, Carlos, and Christian Rechberger, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0.
Texto completoBiham, Eli, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052329.
Texto completoRobshaw, Matthew, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11799313.
Texto completoJoux, Antoine, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9.
Texto completoMatsui, Mitsuru, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x.
Texto completoHong, Seokhie, and Tetsu Iwata, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4.
Texto completoDaemen, Joan, and Vincent Rijmen, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9.
Texto completoMoriai, Shiho, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3.
Texto completoAnderson, Ross, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58108-1.
Texto completoVaudenay, Serge, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1.
Texto completoPeyrin, Thomas, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5.
Texto completoRoy, Bimal, and Willi Meier, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98177.
Texto completoGilbert, Henri, and Helena Handschuh, eds. Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137506.
Texto completoJohansson, Thomas, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b93938.
Texto completoNyberg, Kaisa, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71039-4.
Texto completoKnudsen, Lars, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48519-8.
Texto completo1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Buscar texto completoNational Bureau of Standards. Data encryption standard. U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Buscar texto completoKiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9.
Texto completoYi, Xun, Russell Paulet, and Elisa Bertino. Homomorphic Encryption and Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.
Texto completoDobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.
Texto completoBishop, Matt. The fast encryption package. Research Institute for Advanced Computer Science, 1989.
Buscar texto completoEdin, Muharemagic, and Socek Daniel, eds. Multimedia encryption and watermarking. Springer, 2005.
Buscar texto completoComputer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Buscar texto completoLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 2000.
Buscar texto completoSerdar, Pehlivanoglu, and SpringerLink (Online service), eds. Encryption for Digital Content. Springer Science+Business Media, LLC, 2010.
Buscar texto completoSmith, Marcia S. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.
Buscar texto completoMikhailov, Sergey. Fractal modulation and encryption. De Montfort University, 2000.
Buscar texto completoComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Buscar texto completoLauter, Kristin, Wei Dai, and Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.
Texto completoBlinn, Eric. Managing SQL Server Encryption Certificates. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.
Texto completoBlinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Texto completoCiesla, Robert. Encryption for Organizations and Individuals. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2.
Texto completoColes, Michael, and Rodney Landrum. Expert SQL Server 2008 Encryption. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7.
Texto completoXu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.
Buscar texto completoStaff, Cisco Learning Institute. Encryption. Pearson Education, Limited, 2005.
Buscar texto completo