739 results Skip to content
VuFind
Advanced
  • 0 items (Full)
  • Your Account
  • Log Out
  • Login
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
Advanced
  • Search:
Showing 1 - 20 of 739 for search: '', query time: 0.10s
Information security and privacy in network environments
Published: Office of Technology Assessment, Congress of the U.S. : For sale by the U.S. G.P.O., Supt. of Docs., 1994
Description: viii, 244 pages : illustrations ; 28 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard
by Bassham, Lawrence E.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999
Description: iv, 26 pages : illustrations.
Located: Loading...
Call Number: Loading...
Microfilm Loading...
 Place Hold
Save to List
Saved in:
Cover Image
A statistical test suite for random and pseudorandom number generators for cryptographic applications
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2000
Description: x, 152 pages : illustrations ; 28 cm.
Located: Loading...
Call Number: Loading...
Microfilm Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Data hiding fundamentals and applications : content security in digital media
by Sencar, Husrev T.
Published: Elsevier Academic Press, 2004
Description: xv, 252 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark.
Published: Wiley-Interscience, 2007
Description: xix, 401 pages : illustrations ; 25 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
Cryptographic hardware and embedded systems - CHES 2009 : 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings
Published: Springer, 2009
Description: 1 online resource (xvi, 472 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Fast software encryption : 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers
Published: Springer, 2005
Description: 1 online resource (xi, 441 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers
Published: Springer, 2006
Description: 1 online resource (xi, 432 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers
Published: Springer, 2009
Description: 1 online resource (xi, 415 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : pr...
Published: Springer, 2009
Description: 1 online resource (xiv, 722 pages) : illustrations (some color).
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 20...
Published: Springer, 2008
Description: 1 online resource (xiv, 572 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Quantum communication and quantum networking : First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised selected papers
Published: Springer-Verlag, 2010
Description: 1 online resource (xii, 312 pages).
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof, 1963-
Published: Springer, 2009
Description: 1 online resource (xviii, 372 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Theory of quantum computation, communication and cryptography : 4th workshop, TQC 2009, Waterloo, Canada, May 11-13 : revised selected papers
Published: Springer, 2009
Description: 1 online resource (106 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Topics in cryptology - CT-RSA 2010 : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
Published: Springer-Verlag, 2010
Description: 1 online resource (xi, 396 pages).
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings
Published: Springer, 2010
Description: 1 online resource (x, 240 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Financial cryptography and data security : FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canaray Islands, Spain, January 25-28, 2010 : revised selected papers
Published: Springer, 2010
Description: 1 online resource (x, 255 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Replication : theory and practice
Published: Springer-Verlag, 2010
Description: 1 online resource (xv, 290 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Detection of Intrusions and Malware, and Vulnerability Assessment. 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
by Hutchison, David, 1949-
Published: Springer-Verlag, 2008
Description: 1 online resource.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings
Published: Springer, 2005
Description: 1 online resource (xi, 348 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next »
  • [37]

In Prospector

Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools: Get RSS Feed — Email this Search — Save Search

Narrow Search

Remove Filters
Call Number: Q - Science Subject: Data encryption (Computer science)
Institution
739 Colorado Mesa University see all ...
Collection
731 Electronic Access 4 Main Books 3rd Floor 2 Gov Pub Microfiche 2 Storage Gov Pub see all ...
Format
720 eBook 11 Electronic 6 Book 2 Microfilm see all ...
Subject
Data encryption (Computer science) 477 Computer security 211 Computer networks Security measures 130 Data protection 81 Cryptography 68 Computer science more ... 28 Computers Access control 27 Computer networks Access control 23 Internet Security measures 19 Application software 18 Management information systems 17 Computer networks 17 Digital watermarking 17 Software engineering 16 Coding theory 16 Computers and civilization 15 Algorithms 14 Database management 14 User-centered system design 13 Database security 12 Artificial intelligence 12 Data structures (Computer science) 12 Public key cryptography 11 Computers 11 Quantum computers 10 Information theory 9 Computer science Mathematics 9 Computers Social aspects 9 Data mining 9 Multimedia systems see all ... less ...
Author
713 SpringerLink (Online service) 27 International Conference on the Theory and Application of Cryptology and Information Security 26 CRYPTO (Conference) 25 EUROCRYPT (Conference) 25 European Symposium on Research in Computer Security 24 Theory of Cryptography Conference more ... 19 CRYPTO (Conference) Santa Barbara, Calif.) 18 FC (Conference) 16 Garcia-Alfaro, Joaquin, 16 SAC (Conference) 15 ACNS (Conference) 15 International Conference on Cryptology and Network Security 14 Yung, Moti 13 Cryptographers' Track at RSA Conference 13 ICISC (Conference) 13 Inscrypt (Conference) 13 Yung, Moti, 12 FDSE (Conference) 12 International Conference in Cryptology in India 11 Cryptographers' Track at RSA Conference San Francisco, Calif.) 11 Dang, Tran Khanh, 11 FSE (Workshop) 11 ISC (Conference : Information security) 11 IWDW (Conference) 10 ACISP (Conference) 10 DPM (Workshop) 10 ICISC (Conference) Seoul, Korea) 10 IFIPTM (Conference) 10 Preneel, Bart, 1963- 10 ProvSec (Conference) see all ... less ...
Language
739 English 1 Chinese see all ...
Genre
609 Conference papers and proceedings 34 Computer software 24 Electronic books 11 Dictionaries 8 Festschriften 1 Encyclopedias more ... 1 Handbooks and manuals see all ... less ...
Literary Form
739 Non fiction see all ...
Region
3 United States 1 European Union countries 1 Malaysia see all ...
Call Number
Q - Science see all ...
Year of Publication

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Course Reserves

Need Help?

  • Search Tips
  • Ask a Librarian
Loading...