Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography
- Computer security 394
- Data encryption (Computer science) 320
- World War, 1939-1945 191
- Security measures 165
- History 160
- Computers 108
- Coding theory 104
- Access control 99
- Mathematics 71
- Computer networks 69
- Data protection 69
- Ciphers 62
- Military intelligence 62
- Electronic intelligence 50
- Secret service 48
- Number theory 43
- Data processing 39
- Telecommunication 38
- Cryptology 35
- Security 34
- Algorithms 31
- Participation, Indian 29
- Information theory 28
- Quantum computers 28
- Quantum theory 28
- Campaigns 26
- Foreign relations 24
- Computer science 23
- Cryptographers 23
-
1
Advances in cryptology -- ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, P...
Published 2024Full Text (via Springer)
Electronic Conference Proceeding eBook -
2
-
3
History of the Signal Security Agency /
Published 1947Online Access
Online Access
Government Document eBook -
4
[Existence of war with Germany, and regulations prescribing conduct of alien enemies]
Published 1917Full Text (via ProQuest)
Electronic eBook -
5
-
6
-
7
-
8
Handbook of formal analysis and verification in cryptography /
Published 2024Full Text (via Taylor & Francis)
Electronic eBook -
9
-
10
-
11
-
12
[Directions for communicating with the President while he is cruising in the vicinity of Florida]
Published 1937Full Text (via ProQuest)
Electronic eBook -
13
-
14
-
15
[Procedures for communicating with the President while he is cruising in vicinity of Virgin Islands]
Published 1938Full Text (via ProQuest)
Electronic eBook -
16
-
17
-
18
-
19
-
20
[Extending regulations prescribing the conduct of alien enemies to women]
Published 1918Full Text (via ProQuest)
Electronic eBook