Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography
- Computer security 377
- Data encryption (Computer science) 303
- World War, 1939-1945 191
- Security measures 161
- History 156
- Coding theory 102
- Computers 100
- Access control 91
- Mathematics 70
- Computer networks 68
- Data protection 68
- Military intelligence 63
- Ciphers 61
- Electronic intelligence 50
- Secret service 49
- Number theory 41
- Data processing 39
- Telecommunication 38
- Cryptology 35
- Security 34
- Algorithms 31
- Participation, Indian 29
- Information theory 28
- Quantum computers 28
- Campaigns 27
- Quantum theory 27
- Foreign relations 24
- Computer science 23
- Data transmission systems 23
-
1
Advances in cryptology -- ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, P...
Published 2024Full Text (via Springer)
Electronic Conference Proceeding eBook -
2
-
3
History of the Signal Security Agency /
Published 1947Online Access
Online Access
Government Document eBook -
4
[Existence of war with Germany, and regulations prescribing conduct of alien enemies]
Published 1917Full Text (via ProQuest)
Electronic eBook -
5
-
6
-
7
-
8
Handbook of formal analysis and verification in cryptography /
Published 2024Full Text (via Taylor & Francis)
Electronic eBook -
9
-
10
-
11
-
12
[Directions for communicating with the President while he is cruising in the vicinity of Florida]
Published 1937Full Text (via ProQuest)
Electronic eBook -
13
-
14
-
15
[Procedures for communicating with the President while he is cruising in vicinity of Virgin Islands]
Published 1938Full Text (via ProQuest)
Electronic eBook -
16
-
17
Fundamentals of cryptology : a professional reference and interactive tutorial /
Published 2000Book -
18
-
19
-
20
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers
Published 1987Request ERIC Document
Microfilm Book