Cryptography's role in securing the information society
Saved in:
Corporate Author: | ebrary, Inc |
---|---|
Other Authors: | Dam, Kenneth W., Lin, Herbert |
Format: | Electronic eBook |
Language: | English |
Published: |
Washington, DC :
National Academy Press,
1996.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography's role in securing the information society
Published: (1996)
Published: (1996)
Quantum communication and security
Published: (2007)
Published: (2007)
Quantum communication and security
Published: (2007)
Published: (2007)
Secure communicating systems design, analysis, and implementation /
by: Huth, Michael, 1962-
Published: (2001)
by: Huth, Michael, 1962-
Published: (2001)
Secure communicating systems design, analysis, and implementation /
by: Huth, Michael, 1962-
Published: (2001)
by: Huth, Michael, 1962-
Published: (2001)
Contemporary cryptography
by: Oppliger, Rolf
Published: (2005)
by: Oppliger, Rolf
Published: (2005)
Contemporary cryptography
by: Oppliger, Rolf
Published: (2005)
by: Oppliger, Rolf
Published: (2005)
Disaster recovery planning for communications and critical infrastructure
by: Wrobel, Leo A. (Leo Anthony)
Published: (2009)
by: Wrobel, Leo A. (Leo Anthony)
Published: (2009)
Disaster recovery planning for communications and critical infrastructure
by: Wrobel, Leo A. (Leo Anthony)
Published: (2009)
by: Wrobel, Leo A. (Leo Anthony)
Published: (2009)
Basics of contemporary cryptography for IT practitioners
by: Ryabko, Boris
Published: (2005)
by: Ryabko, Boris
Published: (2005)
Basics of contemporary cryptography for IT practitioners
by: Ryabko, Boris
Published: (2005)
by: Ryabko, Boris
Published: (2005)
Convergence : illicit networks and national security in the age of globalization /
Published: (2013)
Published: (2013)
Convergence : illicit networks and national security in the age of globalization /
Published: (2013)
Published: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
by: Landau, Susan Eva
Published: (2010)
by: Landau, Susan Eva
Published: (2010)
Surveillance or security? the risks posed by new wiretapping technologies /
by: Landau, Susan Eva
Published: (2010)
by: Landau, Susan Eva
Published: (2010)
Online information review.
Published: (2007)
Published: (2007)
Online information review.
Published: (2007)
Published: (2007)
Contemporary cryptography /
by: Oppliger, Rolf
Published: (2011)
by: Oppliger, Rolf
Published: (2011)
Contemporary cryptography /
by: Oppliger, Rolf
Published: (2011)
by: Oppliger, Rolf
Published: (2011)
Security and privacy in mobile and wireless networking /
Published: (2009)
Published: (2009)
Security and privacy in mobile and wireless networking /
Published: (2009)
Published: (2009)
Cryptography for developers
by: St. Denis, Tom
Published: (2007)
by: St. Denis, Tom
Published: (2007)
Cryptography for developers
by: St. Denis, Tom
Published: (2007)
by: St. Denis, Tom
Published: (2007)
Coding and cryptography : synergy for a robust communication /
by: Živić, Nataša
Published: (2013)
by: Živić, Nataša
Published: (2013)
Coding and cryptography : synergy for a robust communication /
by: Živić, Nataša
Published: (2013)
by: Živić, Nataša
Published: (2013)
Cryptography protocols, design and applications /
Published: (2012)
Published: (2012)
Cryptography protocols, design and applications /
Published: (2012)
Published: (2012)
User's guide to cryptography and standards
by: Dent, Alexander W.
Published: (2005)
by: Dent, Alexander W.
Published: (2005)
User's guide to cryptography and standards
by: Dent, Alexander W.
Published: (2005)
by: Dent, Alexander W.
Published: (2005)
Quantum cryptography potentially perfect security.
Published: (2003)
Published: (2003)
Quantum cryptography potentially perfect security.
Published: (2003)
Published: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
Published: (2004)
Published: (2004)
IBM eserver zSeries 990 (z990) cryptography implementation
Published: (2004)
Published: (2004)
Electricity requirements for a digital society
by: Baer, Walter S.
Published: (2002)
by: Baer, Walter S.
Published: (2002)
Electricity requirements for a digital society
by: Baer, Walter S.
Published: (2002)
by: Baer, Walter S.
Published: (2002)
Introduction to communication systems simulation
by: Schiff, Maurice, 1942-
Published: (2006)
by: Schiff, Maurice, 1942-
Published: (2006)
Introduction to communication systems simulation
by: Schiff, Maurice, 1942-
Published: (2006)
by: Schiff, Maurice, 1942-
Published: (2006)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey
Published: (2008)
by: Hoffstein, Jeffrey
Published: (2008)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey
Published: (2008)
by: Hoffstein, Jeffrey
Published: (2008)
PGP & GPG email for the practical paranoid /
by: Lucas, Michael, 1967-
Published: (2006)
by: Lucas, Michael, 1967-
Published: (2006)
Similar Items
-
Cryptography's role in securing the information society
Published: (1996) -
Quantum communication and security
Published: (2007) -
Quantum communication and security
Published: (2007) -
Secure communicating systems design, analysis, and implementation /
by: Huth, Michael, 1962-
Published: (2001) -
Secure communicating systems design, analysis, and implementation /
by: Huth, Michael, 1962-
Published: (2001)