Search Results - "Cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 20
- Cryptography 18
- Data and Information Security 16
- Data protection 16
- History of engineering & technology 15
- Computer networking & communications 13
- Cryptology 13
- Data encryption (Computer science) 13
- Coding theory & cryptology 12
- Artificial intelligence 11
- Computer science 11
- Network security 11
- Software Engineering 10
- Computer networks 9
- Information retrieval 9
- Technology: general issues 9
- Applied mathematics 8
- Computer Communication Networks 8
- Mathematics 8
- Network hardware 8
- Legal aspects of IT 6
- Research & information: general 6
- Application software 5
- Computer and Information Systems Applications 5
- Information theory 5
- Mathematical theory of computation 5
- Computer networks 4
- Computing & information technology 4
- Information technology industries 4
- Information technology: general issues 4
-
141
-
142
-
143
-
144
-
145
-
146
Privacy on the Line The Politics of Wiretapping and Encryption
Published 2007DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
147
-
148
Privacy on the Line The Politics of Wiretapping and Encryption
Published 2010OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
149
-
150
-
151
-
152
-
153
-
154
Recent Advances in Industrial and Applied Mathematics
Published 2022Table of Contents: “…Leng et al., An iterative thresholding method for topology optimization for the Navier-Stokes flow -- 11 K. Sako, Cryptography and Digital Transformation -- 12 H. Suito et al., Numerical Study for Blood Flows in Thoracic Aorta -- 13 J.A.C. …”
Link to Metadata
Electronic eBook -
155
Algorithms for Big Data DFG Priority Program 1736 /
Published 2022Table of Contents: “…Big Data, Scalability, Algorithms, Applications, Graphs, Networks, Parallelism, Distributed, Memory Hierarchy, Algorithm Engineering, Network Analysis, Random Graphs, Graph Clustering, Data Streams, Cryptography, Energy Efficiency, Text Indices.…”
Link to Metadata
Electronic eBook -
156
Coding Theory Recent Advances, New Perspectives and Applications
Published 2022DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
157
Abstract Algebra Theory and Applications
Published 2016Table of Contents: “…Preliminaries -- The Integers -- Groups -- Cyclic Groups -- Permutation Groups -- Cosets and Lagrange's Theorem -- Introduction to Cryptography -- Algebraic Coding Theory -- Isomorphisms -- Normal Subgroups and Factor Groups -- Homomorphisms -- Matrix Groups and Symmetry -- The Structure of Groups -- Group Actions -- The Sylow Theorems -- Rings -- Polynomials -- Integral Domains -- Lattices and Boolean Algebras -- Vector Spaces -- Fields -- Finite Fields -- Galois Theory…”
Access online version
Electronic eBook -
158
Concealing for Freedom The Making of Encryption, Secure Messaging and Digital Liberties
Published 2022DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
159
-
160
APLIKASI KRIPTOGRAFI KOMPOSISI ONE TIME PAD CIPHER DAN AFFINE CIPH
Published 2017Link Metadata
Book