Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
180 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
4. 
Cover image for Non-repudiation in electronic commerce
6. 
Cover image for Advances of DNA computing in cryptography
8. 
Cover image for Information hiding in speech signals for secure communication
11. 
Cover image for Image encryption : a communication perspective
14. 
Cover image for Cryptography and network security : principles and practice
20. 
Cover image for A cryptography primer : secrets and promises
31. 
Cover image for Multimedia information hiding technologies and methodologies for controlling data
35. 
Cover image for Visual cryptography and secret image sharing
40. 
Cover image for Applied cryptography for cyber security and defense : information encryption and cyphering
41. 
Cover image for Chaos synchronization and cryptography for secure communications : applications for encryption
44. 
Cover image for Cryptography and network security : principles and practice
48. 
Cover image for Hashing in computer science : fifty years of slicing and dicing
51. 
Cover image for Broadband quantum cryptography
57. 
Cover image for Security of information and communication networks
58. 
Cover image for Multimedia forensics and security
60. 
Cover image for Multimedia content encryption : techniques and applications
61. 
Cover image for Introduction to identity-based encryption
67. 
Cover image for Intelligent multimedia data hiding : new directions
69. 
Cover image for Applied cryptanalysis : breaking ciphers in the real world
71. 
Cover image for Foundations of Security What Every Programmer Needs to Know
74. 
Cover image for Intelligent multimedia data hiding new directions
78. 
Cover image for Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
79. 
Cover image for Cryptography and security services : mechanisms and applications
83. 
Cover image for Multivariate public key cryptosystems
87. 
Cover image for Concurrent zero knowledge
88. 
Cover image for Quantum communications and cryptography
98. 
Cover image for Data hiding fundamentals and applications : content security in digital media
99. 
Cover image for Outsourcing information security
100. 
Cover image for Implementing SSH : strategies for optimizing the Secure Shell
102. 
Cover image for Watermarking systems engineering : enabling digital assets security and other applications
117. 
Cover image for System-on-chip architectures and implementations for private-key data encryption
145. 
Cover image for Cryptography and network security : principles and practices
151. 
Cover image for Digital cash : commerce on the net
154. 
Cover image for Internet security for business
179. 
Cover image for Cryptographic and Information Security : Approaches for Images and Videos
Go to:Search Results
|
Top of Page
|
Search Facets