Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science) 49
- Standards 42
- Computer security 34
- Information storage and retrieval systems 12
- Text processing (Computer science) 12
- Hashing (Computer science) 7
- Human face recognition (Computer science) 7
- Public key infrastructure (Computer security) 7
- Computer networks 5
- Testing 5
- Access control 4
- Authentication 4
- Computer programs 4
- Government policy 4
- Computer algorithms 3
- Computer software 3
- Cryptography 3
- Digital signatures 3
- Expert systems (Computer science) 3
- File organization (Computer science) 3
- Natural language processing (Computer science) 3
- Random number generators 3
- Security measures 3
- Statistical hypothesis testing 3
- Automatic speech recognition 2
- Biometric identification 2
- Computer simulation 2
- Data compression (Computer science) 2
- Data processing 2
- Debugging in computer science 2
-
1
Recommendation for key management. best practices for key management organization /
Published 2007Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
2
Recommendation for key management. General /
Published 2006Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
3
Face recognition vendor test 2002 supplemental report /
Published 2004Subjects: “…face recognition (Computer science) fast (OCoLC)fst00963060.…”
Online Access
Government Document Electronic eBook -
4
Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) requirements and procedures /
Published 2000Subjects: “…Data encryption (Computer science) Standards.…”
Online Access
Online Access
Government Document Electronic eBook -
5
A lexical analogy to feature matching and pose estimation
Published 2002Subjects: “…File organization (Computer science) http://id.loc.gov/authorities/subjects/sh85048195.…”
Government Document Microfilm Book -
6
S-Check, by example
Published 1997Subjects: “…Debugging in computer science Computer programs. http://id.loc.gov/authorities/subjects/sh86002705.…”
Government Document Microfilm Book -
7
Randomized hashing for digital signatures recommendations of the National Institute of Standards and Technology /
Published 2008Subjects: Online Access
Online Access
Government Document Electronic eBook -
8
Cryptographic algorithms and key sizes for Personal Identity Verification
Published 2010Subjects: “…Data encryption (Computer science) United States.…”
Connect to online resource
Connect to online resource
Government Document Electronic eBook -
9
Recommendation for block cipher modes of operation : Galois/Counter mode (GCM) for confidentiality and authentication /
Published 2006Subjects: “…Data encryption (Computer science)…”
Online Access
Online Access
Government Document eBook -
10
Randomized hashing for digital signatures
Published 2008Subjects: Online Access
Online Access
Government Document Electronic eBook -
11
Combinatorial coverage measurement
Published 2012Subjects: “…Combinatorics and computer science. http://id.loc.gov/authorities/names/n2001008097…”
Online Access
Government Document Electronic eBook -
12
Randomized hashing for digital signatures
Published 2009Subjects: Online Access
Online Access
Government Document Electronic eBook -
13
Modes of operation validation system (MOVS) requirements and procedures /
Published 1998Subjects: “…Data encryption (Computer science) United States.…”
Connect to online resource
Government Document Microfilm Book -
14
Randomness testing of the advanced encryption standard finalist candidates
Published 2000Subjects: “…Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524.…”
Connect to online resource
Government Document Microfilm Book -
15
Recommendation for key derivation through extraction-then-expansion
Published 2011Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
16
Recommendation for existing application-specific key derivation functions
Published 2010Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
17
Transitions recommendation for transitioning the use of cryptographic algorithms and key lengths /
Published 2011Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
18
A framework for designing cryptographic key management systems
Published 2012Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
19
Recommendation for key derivation through extraction-then-expansion
Published 2011Subjects: “…Data encryption (Computer science) Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
20
Software for viewing and converting digital cinema materials
Published 2001Subjects: “…File conversion (Computer science) http://id.loc.gov/authorities/subjects/sh92005723.…”
Government Document Microfilm Book