Limit Search Results
Author
Language
Subject
451 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
2. 
Cover image for Advances of DNA computing in cryptography
3. 
Cover image for CRYPTOLOGY : Classical and Modern
12. 
Cover image for Computing security & cryptography handbook
13. 
Cover image for Practical cryptography: algorithms and implementations using C++
14. 
Cover image for Applications of cryptography and network security
18. 
Cover image for Protocols and procedures of cryptography and network security
19. 
Cover image for Introduction to modern cryptography
20. 
Cover image for Integrated researh in steganography
22. 
Cover image for An introduction to number theory with cryptography
25. 
Cover image for Cryptography for security and privacy in cloud computing
26. 
Cover image for Cryptography and network security : principles and practice
27. 
Cover image for Access control, authentication, and public key infrastructure
28. 
Cover image for A cryptography primer : secrets and promises
40. 
Cover image for Computational number theory and modern cryptography
41. 
Cover image for Cryptography in C and C++
42. 
Cover image for Algebraic geometry modeling in information theory
45. 
Cover image for Cryptography : Infosec pro guide
52. 
Cover image for Security for wireless sensor networks using identity-based cryptography
53. 
Cover image for New directions of modern cryptography
54. 
Cover image for Handbook on soft computing for video surveillance
56. 
Cover image for Mathematics of public key cryptography
59. 
Cover image for Visual cryptography and secret image sharing
63. 
Cover image for Applied cryptography for cyber security and defense : information encryption and cyphering
64. 
Cover image for Chaos synchronization and cryptography for secure communications : applications for encryption
65. 
Cover image for Advanced linear cryptanalysis of block and stream ciphers
66. 
Cover image for Abstract algebra : applications to Galois theory, algebraic geometry, and cryptography
67. 
Cover image for Quantum information and computation IX : 28-29 April 2011, Orlando, Florida, United States
69. 
Cover image for Contemporary cryptography
72. 
Cover image for Introduction to cryptography with mathematical foundations and computer implementations
73. 
Cover image for Cryptography, automata and learning theory
74. 
Cover image for Cryptography and network security : principles and practice
76. 
Cover image for Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
77. 
Cover image for Access control, security, and trust : a logical approach
80. 
Cover image for Introduction to cryptography with open-source software
82. 
Cover image for Hashing in computer science : fifty years of slicing and dicing
83. 
Cover image for Quantum cryptography and computing :  theory and implementation
84. 
Cover image for Understanding cryptography : a textbook for students and practitioners
85. 
Cover image for Broadband quantum cryptography
90. 
Cover image for Cryptography research perspectives
92. 
Cover image for Expert SQL server 2008 encryption
93. 
Cover image for Enhancing cryptographic primitives with techniques from error correcting codes
98. 
Cover image for Number theory in science and communication : with applications in cryptography, physics, digital information, computing, and self-similarity
99. 
Cover image for Primality testing and integer factorization in public-key cryptography
102. 
Cover image for Identity-based cryptography
103. 
Cover image for Disappearing cryptography : information hiding : steganography and watermarking
104. 
Cover image for Understanding and applying cryptography and data security
105. 
Cover image for Cryptography and information security
106. 
Cover image for Introduction to identity-based encryption
110. 
Cover image for Introduction to modern cryptography
111. 
Cover image for An introduction to mathematical cryptography
113. 
Cover image for Data-driven block ciphers for fast telecommunication systems
114. 
Cover image for Modern cryptanalysis : techniques for advanced code breaking
115. 
Cover image for Hardware-based computer security : from biometrics to quantum cryptography
117. 
Cover image for Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers
119. 
Cover image for Cryptography for developers
120. 
Cover image for Computer security and cryptography
122. 
Cover image for Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
123. 
Cover image for Introduction to cryptography and network security
124. 
Cover image for Topics in geometry, coding theory and cryptography
125. 
Cover image for Applied cryptanalysis : breaking ciphers in the real world
126. 
Cover image for Decrypted secrets : methods and maxims of cryptology
127. 
Cover image for Formal correctness of security protocols
128. 
Cover image for Introduction to cryptography : principles and applications
132. 
Cover image for An introduction to cryptography
133. 
Cover image for Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
134. 
Cover image for Quantum information and computation V :   10-12 April 2007, Orlando, Florida, USA
136. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
137. 
Cover image for Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
138. 
Cover image for Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings
139. 
Cover image for Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
140. 
Cover image for Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
143. 
Cover image for Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedings
144. 
Cover image for Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
146. 
Cover image for Advances in coding theory and crytography
147. 
Cover image for Wireless security and cryptography : specifications and implementations
148. 
Cover image for Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers
149. 
Cover image for Cryptography and security services : mechanisms and applications
150. 
Cover image for Finite fields and applications
151. 
Cover image for Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
152. 
Cover image for Protecting information : from classical error correction to quantum cryptography
154. 
Cover image for Algorithmic information theory : mathematics of digital information processing
155. 
Cover image for Cryptography and network security : principles and practices
159. 
Cover image for Cryptographic algorithms on reconfigurable hardware
160. 
Cover image for Quantum cryptography and secret-key distillation
161. 
Cover image for Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
167. 
Cover image for A classical introduction to cryptography exercise book
169. 
Cover image for Cryptographic libraries for developers
171. 
Cover image for Complexity and cryptography : an introduction
172. 
Cover image for Cryptographic libraries for developers
173. 
Cover image for Cryptography in the database : the last line of defense
174. 
Cover image for Practical cryptology and Web security
178. 
Cover image for Introduction to cryptography : with coding theory
179. 
Cover image for Authentification codes and combinatorial designs
180. 
Cover image for Cryptography : theory and practice
181. 
Cover image for A classical introduction to cryptography : applications for communications security
182. 
Cover image for Concurrent zero knowledge
183. 
Cover image for Quantum communications and cryptography
184. 
Cover image for Applied public key infrastructure : 4th International Workshop : IWAP 2005
187. 
Cover image for Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysia
195. 
Cover image for Cryptography, information theory, and error-correction : a handbook for the 21st century
196. 
Cover image for Classical and contemporary cryptology
197. 
Cover image for User's guide to cryptography and standards
199. 
Cover image for Contemporary cryptography
201. 
Cover image for Basics of contemporary cryptography for IT practitioners
203. 
Cover image for The German enigma cipher machine : beginnings, success, and ultimate failure
207. 
Cover image for Beginning cryptography with Java
208. 
Cover image for Modern cryptography : theory and practice
209. 
Cover image for Introduction to cryptography
217. 
Cover image for Information security intelligence : cryptographic principles and applications
218. 
Cover image for Intelligent watermarking techniques
220. 
Cover image for Intelligent watermarking techniques
222. 
Cover image for Malicious cryptography : exposing cryptovirology
223. 
Cover image for Java cryptography extensions : practical guide for programmers
224. 
Cover image for Cryptography for dummies
226. 
Cover image for Wiley survival guide in global telecommunications:  broadband access, optical components and networks, and cryptography
227. 
Cover image for Information security intelligence : cryptographic principles and applications
236. 
Cover image for Cryptography and public key infrastructure on the Internet
237. 
Cover image for Cryptanalysis of number theoretic ciphers
246. 
Cover image for System-on-chip architectures and implementations for private-key data encryption
249. 
Cover image for Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers
252. 
Cover image for Introduction to cryptography with Java applets
255. 
Cover image for Cryptography demystified
257. 
Cover image for Practical cryptography
258. 
Cover image for Internet security : cryptographic principles, algorithms, and protocols
259. 
Cover image for Cryptography and network security : principles and practices
262. 
Cover image for Cryptography: an introduction
273. 
284. 
Cover image for Introduction to cryptography : with coding theory
287. 
Cover image for Coding theory and cryptology
288. 
Cover image for Cryptography for Internet and database applications : developing secret and public key techniques with Java
290. 
Cover image for Cryptography : an introduction
291. 
Cover image for Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
299. 
Cover image for Foundations of logic and mathematics : applications to computer science and cryptography