Search Results - "Cryptography"

  1. 201
  2. 202
  3. 203
  4. 204

    Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /

    Published 2020
    Table of Contents: “…Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.…”
    Link to Metadata
    Electronic eBook
  5. 205
  6. 206
  7. 207
  8. 208

    Quantum Computing for the Quantum Curious by Hughes, Ciaran, Isaacson, Joshua, Perry, Anastasia, Sun, Ranbel F., Turner, Jessica

    Published 2021
    Table of Contents: “…-- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9 Quantum Algorithms -- 10 Worksheets -- Appendices -- Alphabetical Index -- Acknowledgments -- Answers.…”
    Link to Metadata
    Electronic eBook
  9. 209

    VLSI

    Published 2010
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  10. 210
  11. 211
  12. 212
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220