Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science) 84
- Computer security 28
- Security measures 24
- Data Encryption 18
- Cryptography 17
- Computer networks 16
- Computer science 16
- Computer Science 14
- Computers 12
- Law and legislation 11
- Access control 8
- COMPUTERS / Cryptography 6
- Coding theory 6
- Information Systems and Communication Service 6
- Political aspects 6
- Privacy, Right of 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Wiretapping 6
- Ciphers 4
- Electronic information resources 4
- Electronic surveillance 4
- Embedded computer systems 4
- MATHEMATICS / Recreations & Games 4
- Public key cryptography 4
- Telecommunication 4
- Aspect politique 2
- Business Information Systems 2
- COMPUTERS / Computer Graphics / Game Programming & Design 2
- COMPUTERS / Database Management / Data Mining 2
-
1
Quantum cryptography potentially perfect security.
Published 2003Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Cryptography protocols, design and applications /
Published 2012Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Cryptography protocols, design and applications /
Published 2012Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Quantum cryptography potentially perfect security.
Published 2003Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Identity-based cryptography
Published 2009Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Color image watermarking : algorithms and technologies /
Published 2017Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Identity-based cryptography
Published 2009Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Color image watermarking : algorithms and technologies /
Published 2017Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Machine learning in image steganalysis
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Video encryption technology and application
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
-
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Machine learning in image steganalysis
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Video encryption technology and application
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
-
17
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Implementing SSH strategies for optimizing the Secure Shell /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Securing information and communications systems principles, technologies, and applications /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook