Canlyniadau Chwilio - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
Cyhoeddwyd 2003Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
2
Cryptography protocols, design and applications /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
3
Cryptography protocols, design and applications /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
4
Quantum cryptography potentially perfect security.
Cyhoeddwyd 2003Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
5
Identity-based cryptography
Cyhoeddwyd 2009Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
6
Color image watermarking : algorithms and technologies /
Cyhoeddwyd 2017Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
7
Identity-based cryptography
Cyhoeddwyd 2009Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
8
Color image watermarking : algorithms and technologies /
Cyhoeddwyd 2017Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science) Law and legislation....”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
10
Machine learning in image steganalysis
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
11
Video encryption technology and application
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
12
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Cyhoeddwyd 2015Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science) Law and legislation....”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
14
Machine learning in image steganalysis
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
15
Video encryption technology and application
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
16
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Cyhoeddwyd 2015Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
17
Trusted platform module basics using TPM in embedded systems /
Cyhoeddwyd 2006Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
18
Trusted platform module basics using TPM in embedded systems /
Cyhoeddwyd 2006Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
19
Implementing SSH strategies for optimizing the Secure Shell /
Cyhoeddwyd 2004Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
20
Securing information and communications systems principles, technologies, and applications /
Cyhoeddwyd 2008Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr