Risultati della ricerca - "cryptography"
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computer security 20
- Cryptography 18
- Data and Information Security 16
- Data protection 16
- History of engineering & technology 15
- Computer networking & communications 13
- Cryptology 13
- Data encryption (Computer science) 13
- Coding theory & cryptology 12
- Artificial intelligence 11
- Computer science 11
- Network security 11
- Software Engineering 10
- Computer networks 9
- Information retrieval 9
- Technology: general issues 9
- Applied mathematics 8
- Computer Communication Networks 8
- Mathematics 8
- Network hardware 8
- Legal aspects of IT 6
- Research & information: general 6
- Application software 5
- Computer and Information Systems Applications 5
- Information theory 5
- Mathematical theory of computation 5
- Computer networks 4
- Computing & information technology 4
- Information technology industries 4
- Information technology: general issues 4
-
141
-
142
Program Aplikasi Kriptografi Penyandian One Time Pad Menggunakan Sandi Vigenere
Pubblicazione 2014Link Metadata
Libro -
143
-
144
-
145
-
146
Privacy on the Line The Politics of Wiretapping and Encryption
Pubblicazione 2007DOAB: download the publication
DOAB: description of the publication
Elettronico Capitolo di libro -
147
-
148
Privacy on the Line The Politics of Wiretapping and Encryption
Pubblicazione 2010OAPEN Library: download the publication
OAPEN Library: description of the publication
Elettronico Capitolo di libro -
149
-
150
ENKRIPSI DAN DEKRIPSI SUARA MENGGUNAKAN METODE AES 128 BIT DENGAN SECRET KEY
Pubblicazione 2021Link Metadata
Libro -
151
-
152
-
153
-
154
Recent Advances in Industrial and Applied Mathematics
Pubblicazione 2022Sommario: “...Leng et al., An iterative thresholding method for topology optimization for the Navier-Stokes flow -- 11 K. Sako, Cryptography and Digital Transformation -- 12 H. Suito et al., Numerical Study for Blood Flows in Thoracic Aorta -- 13 J.A.C. ...”
Link to Metadata
Elettronico eBook -
155
Algorithms for Big Data DFG Priority Program 1736 /
Pubblicazione 2022Sommario: “...Big Data, Scalability, Algorithms, Applications, Graphs, Networks, Parallelism, Distributed, Memory Hierarchy, Algorithm Engineering, Network Analysis, Random Graphs, Graph Clustering, Data Streams, Cryptography, Energy Efficiency, Text Indices....”
Link to Metadata
Elettronico eBook -
156
Coding Theory Recent Advances, New Perspectives and Applications
Pubblicazione 2022DOAB: download the publication
DOAB: description of the publication
Elettronico Capitolo di libro -
157
Abstract Algebra Theory and Applications
Pubblicazione 2016Sommario: “...Preliminaries -- The Integers -- Groups -- Cyclic Groups -- Permutation Groups -- Cosets and Lagrange's Theorem -- Introduction to Cryptography -- Algebraic Coding Theory -- Isomorphisms -- Normal Subgroups and Factor Groups -- Homomorphisms -- Matrix Groups and Symmetry -- The Structure of Groups -- Group Actions -- The Sylow Theorems -- Rings -- Polynomials -- Integral Domains -- Lattices and Boolean Algebras -- Vector Spaces -- Fields -- Finite Fields -- Galois Theory...”
Access online version
Elettronico eBook -
158
Concealing for Freedom The Making of Encryption, Secure Messaging and Digital Liberties
Pubblicazione 2022DOAB: download the publication
DOAB: description of the publication
Elettronico Capitolo di libro -
159
Concealing for Freedom The Making of Encryption, Secure Messaging and Digital Liberties
Pubblicazione 2022OAPEN Library: download the publication
OAPEN Library: description of the publication
Elettronico Capitolo di libro -
160
APLIKASI KRIPTOGRAFI KOMPOSISI ONE TIME PAD CIPHER DAN AFFINE CIPH
Pubblicazione 2017Link Metadata
Libro