Data encryption (Computer science)
概要
作品: | 397 作品在 319 項出版品 319 種語言 |
---|
書目資訊
Writing secure code = practical strategies and proven techniques for building secure applications in a networked world /
by:
(書目-語言資料,印刷品)
Privacy technologies and policy = second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014 : proceedings /
by:
(書目-電子資源)
Secure data management = 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(書目-電子資源)
Security and trust management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(書目-電子資源)
Computer Security - ESORICS 2005 : = 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
by:
(書目-語言資料,印刷品)
Networked RFID Systems and Lightweight Cryptography = Raising Barriers to Product Counterfeiting /
by:
(書目-語言資料,印刷品)
Selected areas in cryptography = 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002 : revised papers /
by:
(書目-語言資料,印刷品)
Selected areas in cryptography = 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings /
by:
(書目-語言資料,印刷品)
Secure data management = 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Information theoretic security = 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(書目-語言資料,印刷品)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Information security and assurance = 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(書目-語言資料,印刷品)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(書目-語言資料,印刷品)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(書目-電子資源)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(書目-電子資源)
Secure data management = 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(書目-電子資源)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(書目-電子資源)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(書目-電子資源)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(書目-電子資源)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(書目-電子資源)
Fast software encryption = 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(書目-電子資源)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(書目-電子資源)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(書目-電子資源)
Post-quantum cryptography = 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings /
by:
(書目-電子資源)
Secure IT systems = 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Security protocols XXII = 22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(書目-電子資源)
Provable security = 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(書目-電子資源)
Information security = 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(書目-電子資源)
Security protocols XVIII = 18th International Workshop, Cambridge, UK, March 24-26, 2010 : revised selected papers /
by:
(書目-電子資源)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Information theoretic security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(書目-電子資源)
Fast software encryption = 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(書目-電子資源)
Information security and privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(書目-語言資料,印刷品)
E-Voting and identity = 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(書目-電子資源)
Information security = 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 : proceedings /
by:
(書目-電子資源)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(書目-電子資源)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(書目-電子資源)
Image and video encryption = from digital rights management to secured personal communication /
by:
(書目-語言資料,印刷品)
Image and Video Encryption = From Digital Rights Management to Secured Personal Communication /
by:
(書目-語言資料,印刷品)
Applied cryptography for cyber security and defense = information encryption and cyphering /
by:
(書目-電子資源)
Chaos synchronization and cryptography for secure communications = applications for encryption /
by:
(書目-電子資源)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(書目-電子資源)
Security protocols XX = 20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security IX = Special Issue on Visual Cryptography /
by:
(書目-電子資源)
Visual cryptography for image processing and security = theory, methods, and applications /
by:
(書目-電子資源)
Trustworthy reconfigurable systems = enhancing the security capabilities of reconfigurable hardware architectures /
by:
(書目-電子資源)
Visual cryptography for image processing and security = theory, methods, and applications /
by:
(書目-電子資源)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(書目-電子資源)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(書目-電子資源)
Cryptography and coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(書目-電子資源)
Information security = 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013 : proceedings /
by:
(書目-電子資源)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXIII = selected papers from FDSE 2014 /
by:
(書目-電子資源)
Engineering secure software and systems = 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(書目-電子資源)
Trusted systems = 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(書目-電子資源)
The new codebreakers = essays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(書目-電子資源)
Information security = 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(書目-電子資源)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXXI = special issue on data and security engineering /
by:
(書目-電子資源)
Verifiable composition of signature and encryption = a comprehensive study of the design paradigms /
by:
(書目-電子資源)
Building decentralized trust = multidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(書目-電子資源)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(書目-電子資源)
Energy-efficient modular exponential techniques for public-key cryptography = efficient modular exponential techniques /
by:
(書目-電子資源)
Stream ciphers in modern real-time IT systems = analysis, design and comparative studies /
by:
(書目-電子資源)
Guide to internet cryptography = security protocols and real-world attack implications /
by:
(書目-電子資源)
An introduction to secret sharing = a systematic overview and guide for protocol selection /
by:
(書目-電子資源)
Homomorphic encryption for financial cryptography = recent inventions and challenges /
by:
(書目-電子資源)
Understanding cryptography = from established symmetric and asymmetric ciphers to post-quantum algorithms /
by:
(書目-電子資源)
Post-quantum cryptography = 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(書目-電子資源)
Cryptology transmitted message protection = from deterministic chaos up to optical vortices /
by:
(書目-電子資源)
Handbook of research on modern cryptographic solutions for computer and cyber security
by:
(書目-電子資源)
Pro cryptography and cryptanalysis with C++20 = creating and programming advanced algorithms /
by:
(書目-電子資源)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
by:
(書目-電子資源)
Hiding behind the keyboard = uncovering covert communication methods with forensic analysis /
by:
(書目-電子資源)
Cryptography apocalypse = preparing for the day when quantum computing breaks today's crypto /
by:
(書目-電子資源)
Algorithms and architectures for cryptography and source coding in non-volatile flash memories
by:
(書目-電子資源)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(書目-電子資源)
更多
較少的
主題