Search Results
 
  Search result  Your search for [subject]Data encryption (Computer science) returned 13 records.  
 
Sort by:  
 
     
  Continuing Resource ACM transactions on privacy and security.

New York, NY: Association for Computing Machinery, 1997.

Subject: Computer science; Data protection; Computer security; Data encryption (Computer science); Information storage and retrieval systems.

 
     
Relevance: 26.76%
 
     
  Book Top secret : data encryption techniques _ Data encryption techniques.

by Held, Gilbert, 1943-; Carmel, Ind.: Sams, 1993.

Subject: Computers -- Access control -- Passwords; Cryptography; Data encryption (Computer science); Data protection.

 
     
Relevance: 24.37%
 
     
  Book Presenting digital cash _ Digital cash.

by Godin, Seth; Indianapolis, Ind.: Sams.net, 1995.

Subject: Business enterprises -- Computer networks -- Security measures; Data encryption (Computer science); Electronic funds transfers; Internet (Computer network); Smart cards.

 
     
Relevance: 24.01%
 
     
  Book Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public.

by Beutelspacher, Albrecht; [Washington, DC]: Mathematical Association of America, 1994.

Subject: Cryptography; Data encryption (Computer science).

 
     
Relevance: 23.97%
 
     
  Book Parallelized factoring operation for the RSA public key.

by Estrella, Florida Valerio.; 1997.

Subject: Algorithms; Cryptography; Data encryption (Computer science).

 
     
Relevance: 23.71%
 
     
  Book Cryptography and network security : principles and practice.

by Stallings, William; Upper Saddle River, N.J.: Prentice-Hall International, 1999.

Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.

 
     
Relevance: 22.96%
 
     
  Book Cryptography and network security : principles and practice.

by Stallings, William; Upper Saddle River, N.J.: Pearson Education International, 2006.

Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.

 
     
Relevance: 22.96%
 
     
  Book Internet security for business.

New York: Wiley, 1996.

Subject: Business enterprises -- Computer networks -- Security measures; Internet (Computer network) -- Security measures; World Wide Web -- Security measures; Electronic funds transfers -- Security measures; Data encryption (Computer science).

 
     
Relevance: 20.70%
 
     
  Book Internet security for business.

New York: Wiley, 1996.

Subject: Business enterprises -- Computer networks -- Security measures; Data encryption (Computer science); Electronic funds transfers -- Security measures; Internet (Computer network) -- Security measures; World Wide Web (Information retrieval system) -- Security measures.

 
     
Relevance: 20.70%
 
     
  Thesis An improvement on logical key hierarchy algorithm for multicast and group security.

by Ho Hai Van; 2005.

Subject: Multicasting (Computer networks) -- Security measures; Computer networks -- Security measures; Data encryption (Computer Science); Multichannel communication; Broadband communication systems.

 
     
Relevance: 20.19%
 
     
« Previous  1  2  Next »
         
         
Online Catalog
Basic Search
Advanced Search
Browse Subjects
Book Cart
 
         

Text Size:
S  -  M  -  L
Copyright © 2004-2024. Philippine eLib Project
Host: U.P. Diliman University Library