Libros sobre el tema "Secret-key cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 22 mejores mejores libros para su investigación sobre el tema "Secret-key cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Galbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.
Buscar texto completo1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Scholarly Resources Inc., 1988.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.
Buscar texto completoQUANTUM CRYPTOGRAPHY AND SECRET-KEY DISTILLATION. CAMBRIDGE UNIV PRESS, 2006.
Buscar texto completoRubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoSecret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2003.
Buscar texto completoGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2012.
Buscar texto completoCryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.
Buscar texto completoDowning, Taylor. Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Little, Brown Book Group Limited, 2014.
Buscar texto completoSecret warriors: Key scientists, code breakers and propagandists of the Great War. Little, Brown, 2014.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoNoiseless steganography: The key to covert communications. Auerbach Publications, 2012.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Taylor & Francis Group, 2012.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoGaivoronski, Alexei A., Pavel S. Knopov, Vladimir I. Norkin, and Volodymyr A. Zaslavskyi. Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo.
Texto completo(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.
Buscar texto completo