Search Results - "Cryptology"
Suggested Topics within your search.
Suggested Topics within your search.
- Coding theory & cryptology 34
- Computer security 18
- Cryptography 13
- Cryptology 13
- Data and Information Security 13
- Data encryption (Computer science) 13
- Data protection 13
- Network hardware 12
- Artificial intelligence 11
- Software Engineering 10
- Information retrieval 8
- Network security 8
- Computer networks 7
- Computer Communication Networks 6
- Application software 5
- Computer and Information Systems Applications 5
- Information technology: general issues 5
- Computer networking & communications 4
- Computer networks 4
- Expert systems / knowledge-based systems 4
- Mobile and Network Security 4
- Security measures 4
- Software engineering 4
- Artificial Intelligence 3
- Computer science 3
- Impact of science & technology on society 3
- Universities 3
- Algorithms & data structures 2
- Computing & information technology 2
- Data encryption 2
-
1
Knowledge Unbound Selected Writings on Open Access, 2002-2011
Published 2016Subjects: “…Coding theory & cryptology bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
2
Open Access
Published 2012Subjects: “…Coding theory & cryptology bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
3
Open Access
Published 2012Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
4
Building the Infrastructure for Cloud Security A Solutions View /
Published 2014Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
5
Real Life Cryptology
Published 2018Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
6
Real Life Cryptology
Published 2018Subjects: “…Coding theory & cryptology bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
7
Applications of Secure Multiparty Computation
Published 2015Subjects: “…cryptology…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
8
Intel Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Published 2013Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
9
The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value /
Published 2014Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
10
Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine /
Published 2014Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
11
A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security /
Published 2015Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
12
The Atlas of Economic Complexity Mapping Paths to Prosperity
Published 2014Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
13
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
14
The InfoSec Handbook An Introduction to Information Security /
Published 2014Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
15
Trends in Data Protection and Encryption Technologies
Published 2023Subjects: “…Cryptology.…”
Link to Metadata
Electronic eBook -
16
Knowledge Unbound Selected Writings on Open Access, 2002-2011
Published 2016Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
17
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War
Published 2013Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
18
The End of Ownership Personal Property in the Digital Economy
Published 2016Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
19
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War
Published 2013Subjects: “…Coding theory & cryptology bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
20
Trends in Data Protection and Encryption Technologies
Published 2023Subjects: “…Coding theory & cryptology bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter