|
Your search for [subject]Data encryption (Computer science) returned 13 records. |
|
|
Sort by:
|
|
|
|
|
|
|
|
ACM transactions on privacy and security.
New York, NY: Association for Computing Machinery, 1997.
Subject: Computer science; Data protection; Computer security; Data encryption (Computer science); Information storage and retrieval systems.
|
|
|
|
|
|
|
|
|
|
|
|
|
Top secret : data encryption techniques _ Data encryption techniques.
by Held, Gilbert, 1943-; Carmel, Ind.: Sams, 1993.
Subject: Computers -- Access control -- Passwords; Cryptography; Data encryption (Computer science); Data protection.
|
|
|
|
|
|
|
|
|
|
|
|
|
Presenting digital cash _ Digital cash.
by Godin, Seth; Indianapolis, Ind.: Sams.net, 1995.
Subject: Business enterprises -- Computer networks -- Security measures; Data encryption (Computer science); Electronic funds transfers; Internet (Computer network); Smart cards.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public.
by Beutelspacher, Albrecht; [Washington, DC]: Mathematical Association of America, 1994.
Subject: Cryptography; Data encryption (Computer science).
|
|
|
|
|
|
|
|
|
|
|
|
|
Parallelized factoring operation for the RSA public key.
by Estrella, Florida Valerio.; 1997.
Subject: Algorithms; Cryptography; Data encryption (Computer science).
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptography and network security : principles and practice.
by Stallings, William; Upper Saddle River, N.J.: Prentice-Hall International, 1999.
Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptography and network security : principles and practice.
by Stallings, William; Upper Saddle River, N.J.: Pearson Education International, 2006.
Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet security for business.
New York: Wiley, 1996.
Subject: Business enterprises -- Computer networks -- Security measures; Internet (Computer network) -- Security measures; World Wide Web -- Security measures; Electronic funds transfers -- Security measures; Data encryption (Computer science).
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet security for business.
New York: Wiley, 1996.
Subject: Business enterprises -- Computer networks -- Security measures; Data encryption (Computer science); Electronic funds transfers -- Security measures; Internet (Computer network) -- Security measures; World Wide Web (Information retrieval system) -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
An improvement on logical key hierarchy algorithm for multicast and group security.
by Ho Hai Van; 2005.
Subject: Multicasting (Computer networks) -- Security measures; Computer networks -- Security measures; Data encryption (Computer Science); Multichannel communication; Broadband communication systems.
|
|
|
|
|
|
|
|
|
|
« Previous 1 2 Next » |