Showing 1 - 20 results of 93 for search '"Computer science."', query time: 0.08s Refine Results
  1. 1

    Recommendation for key management. best practices for key management organization / by Barker, Elaine B.

    Published 2007
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  2. 2

    Recommendation for key management. General / by Barker, Elaine B.

    Published 2006
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  3. 3

    Face recognition vendor test 2002 supplemental report / by Grother, Partick

    Published 2004
    Subjects: “…face recognition (Computer science) fast (OCoLC)fst00963060.…”
    Online Access
    Government Document Electronic eBook
  4. 4

    Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) requirements and procedures / by Keller, Sharon

    Published 2000
    Subjects: “…Data encryption (Computer science) Standards.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  5. 5

    A lexical analogy to feature matching and pose estimation by Horst, John Albert

    Published 2002
    Subjects: “…File organization (Computer science) http://id.loc.gov/authorities/subjects/sh85048195.…”
    Government Document Microfilm Book
  6. 6

    S-Check, by example by Snelick, Robert

    Published 1997
    Subjects: “…Debugging in computer science Computer programs. http://id.loc.gov/authorities/subjects/sh86002705.…”
    Government Document Microfilm Book
  7. 7

    Randomized hashing for digital signatures recommendations of the National Institute of Standards and Technology / by Dang, Quynh

    Published 2008
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  8. 8

    Cryptographic algorithms and key sizes for Personal Identity Verification by Polk, Tim, 1962-

    Published 2010
    Subjects: “…Data encryption (Computer science) United States.…”
    Connect to online resource
    Connect to online resource
    Government Document Electronic eBook
  9. 9

    Recommendation for block cipher modes of operation : Galois/Counter mode (GCM) for confidentiality and authentication / by Dworkin, Morris

    Published 2006
    Subjects: “…Data encryption (Computer science)…”
    Online Access
    Online Access
    Government Document eBook
  10. 10

    Randomized hashing for digital signatures by Dang, Quynh

    Published 2008
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  11. 11

    Combinatorial coverage measurement by Kuhn, D. Richard

    Published 2012
    Subjects: “…Combinatorics and computer science. http://id.loc.gov/authorities/names/n2001008097…”
    Online Access
    Government Document Electronic eBook
  12. 12

    Randomized hashing for digital signatures by Dang, Quynh

    Published 2009
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  13. 13

    Modes of operation validation system (MOVS) requirements and procedures / by Keller, Sharon

    Published 1998
    Subjects: “…Data encryption (Computer science) United States.…”
    Connect to online resource
    Government Document Microfilm Book
  14. 14

    Randomness testing of the advanced encryption standard finalist candidates by Soto, Juan, 1969-

    Published 2000
    Subjects: “…Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524.…”
    Connect to online resource
    Government Document Microfilm Book
  15. 15

    Recommendation for key derivation through extraction-then-expansion by Chen, Lily

    Published 2011
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  16. 16

    Recommendation for existing application-specific key derivation functions by Dang, Quynh

    Published 2010
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  17. 17

    Transitions recommendation for transitioning the use of cryptographic algorithms and key lengths / by Barker, Elaine B.

    Published 2011
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  18. 18

    A framework for designing cryptographic key management systems

    Published 2012
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  19. 19

    Recommendation for key derivation through extraction-then-expansion by Chen, Lily

    Published 2011
    Subjects: “…Data encryption (Computer science) Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  20. 20

    Software for viewing and converting digital cinema materials by Fenimore, Charles

    Published 2001
    Subjects: “…File conversion (Computer science) http://id.loc.gov/authorities/subjects/sh92005723.…”
    Government Document Microfilm Book
Search Tools: RSS Feed Save Search