Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Encryption module.

Książki na temat „Encryption module”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 29 najlepszych książek naukowych na temat „Encryption module”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.

1

Annabelle, Lee, Carnahan Lisa J, National Institute of Standards and Technology (U.S.), and NVLAP (Program : U.S.), eds. Cryptographic module testing. U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kinney, Steven. Trusted Platform Module Basics. Newnes, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Workshop, on Fault Diagnosis and Tolerance in Cryptography (5th 2008 Washington D. C. ). FDTC 2008: Fault diagnosis and tolerance in cryptography : 10 August 2008, Washington, DC, USA. IEEE Computer Society, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Workshop on Fault Diagnosis and Tolerance in Cryptography (5th 2008 Washington, D.C.). FDTC 2008: Fault diagnosis and tolerance in cryptography : 10 August 2008, Washington, DC, USA. IEEE Computer Society, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Workshop on Fault Diagnosis and Tolerance in Cryptography (5th 2008 Washington, D.C.). FDTC 2008: Fault diagnosis and tolerance in cryptography : 10 August 2008, Washington, DC, USA. IEEE Computer Society, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Workshop on Fault Diagnosis and Tolerance in Cryptography (4th 2007 Vienna, Austria). Workshop on Fault Diagnosis and Tolerance in Cryptography: FDTC 2007 : proceedings : 10 September, 2007, Vienna, Austria. IEEE Computer Society, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Workshop on Fault Diagnosis and Tolerance in Cryptography (6th 2009 Lausanne, Switzerland). FDTC 2009: 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings, 6 September 2009, Lausanne, Switzerland. Edited by Breveglieri Luca and IEEE Computer Society. IEEE Computer Society, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Workshop on Fault Diagnosis and Tolerance in Cryptography (7th 2010 Santa Barbara, Calif.). FDTC 2010: Fault Diagnosis and Tolerance in Cryptography : proceedings, Santa Barbara, California, 21 August 2010. Edited by Breveglieri Luca, Institute of Electrical and Electronics Engineers, and IEEE Computer Society. IEEE Computer Society, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Benjamin, Livshits, Scandariato Riccardo, and SpringerLink (Online service), eds. Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Jürjens, Jan. Engineering Secure Software and Systems: 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Arthur, Will. A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security. Springer Nature, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Pełny tekst źródła
Streszczenie:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and H
Style APA, Harvard, Vancouver, ISO itp.
14

Martin, Keith M. Historical Cryptosystems. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0002.

Pełny tekst źródła
Streszczenie:
This chapter presents several historical cryptosystems. These are all relatively simple, and none are fit for modern use. These cryptosystems serve to illustrate the basic model of a cryptosystem, as well as introduce a number of important design principles for modern encryption algorithms. We demonstrate the importance of a large keyspace, randomness of ciphertext, and positional dependence. We also show how efficiency and security are often traded off against one another when designing a cryptosystem.
Style APA, Harvard, Vancouver, ISO itp.
15

Seifert, Jean-Pierre, David Naccache, Israel Koren, and Luca Breveglieri. Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings. Springer London, Limited, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Copeland, B. J., ed. The Essential Turing. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780198250791.001.0001.

Pełny tekst źródła
Streszczenie:
Alan Turing was one of the most influential thinkers of the 20th century. In 1935, aged 22, he developed the mathematical theory upon which all subsequent stored-program digital computers are modeled. At the outbreak of hostilities with Germany in September 1939, he joined the Government Codebreaking team at Bletchley Park, Buckinghamshire and played a crucial role in deciphering Engima, the code used by the German armed forces to protect their radio communications. Turing's work on the version of Enigma used by the German navy was vital to the battle for supremacy in the North Atlantic. He al
Style APA, Harvard, Vancouver, ISO itp.
17

Sanín-Restrepo, Ricardo, Marinella Machado-Araujo, and Sabelo J. Ndlovu-Gatsheni, eds. Decrypting Justice. Lexington Books, 2025. https://doi.org/10.5040/9781978748538.

Pełny tekst źródła
Streszczenie:
This book deploys the theory of encryption of to decrypt justice, setting in opposition Justice, written with the hegemonic capital letters of Western ideas, and justice, in its everyday workings within disparate communal forms and the exercise of multiplicity. As it decrypts justice, the book argues that late-coloniality, through its construction of the “hidden people,” shattered the possibility of true communities in the service of a transcendent model, consisting ofthe market, the constitution, the nation, and the economy. The first three chapters serve as the theoretical backbone of the bo
Style APA, Harvard, Vancouver, ISO itp.
18

Martens, David. Data Science Ethics. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192847263.001.0001.

Pełny tekst źródła
Streszczenie:
Data science ethics is all about what is right and wrong when conducting data science. Data science has so far mainly been used for positive outcomes for businesses and society. However, just as with any technology, data science has also come with some negative consequences: an increase of privacy invasion, data-driven discrimination against sensitive groups, and decision making by complex models without explanations. This book looks at the different concepts and techniques related to data science ethics. Data scientists and business managers are not inherently unethical, but at the same time
Style APA, Harvard, Vancouver, ISO itp.
19

Jürjens, Jan, Ben Livshits, and Riccardo Scandariato. Engineering Secure Software and Systems: 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Springer, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Jürjens, Jan, Ben Livshits, and Riccardo Scandariato. Engineering Secure Software and Systems: 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Springer, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Jürjens, Jan, Frank Piessens, and Nataliia Bielova. Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings. Springer, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Jürjens, Jan, Frank Piessens, and Nataliia Bielova. Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings. Springer, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, ... Springer, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Askoxylakis, Ioannis, and Theo Tryfonas. Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held As Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. Springer London, Limited, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Tryfonas, Theo. Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held As Part of HCI International 2016, Toronto, on, Canada, July 17-22, 2016, Proceedings. Springer, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Askoxylakis, Ioannis, and Theo Tryfonas. Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held As Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings. Springer London, Limited, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Askoxylakis, Ioannis, and Theo Tryfonas. Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los ... Springer, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Cryptography Made Simple. Springer, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Cryptography Made Simple. Springer London, Limited, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!