Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 641
- Data encryption (Computer science) 521
- Security measures 494
- Cryptography 431
- Computer networks 364
- Computer science 132
- Computers 112
- Access control 103
- Data protection 100
- Mathematics 78
- Coding theory 70
- Blockchains (Databases) 62
- Artificial intelligence 47
- History 43
- Wireless communication systems 43
- Information technology 42
- Internet 40
- Cloud computing 38
- Computer software 38
- Data processing 38
- Examinations 38
- Security 37
- Cryptographers 35
- Software engineering 34
- Data structures (Computer science) 33
- Telecommunication 33
- Internet of things 32
- Application software 31
- Electronic funds transfers 31
- Certification 30
-
1
-
2
-
3
The Cryptographic Imagination Secret Writing from Edgar Poe to the Internet /
Published 2019Full Text (via Project MUSE)
Electronic eBook -
4
-
5
Cryptographic protocol security analysis based on trusted freshness /
Published 2012Table of Contents: “…Introduction of Cryptographic Protocols --…”
Full Text (via Springer)
Electronic eBook -
6
-
7
-
8
-
9
-
10
-
11
-
12
Identifying Cryptographic Functions from Data Curation to Model Building.
Published 2019Full Text (via OSTI)
Government Document Electronic eBook -
13
-
14
-
15
Cryptographic agility and interoperability : proceedings of a workshop /
Published 2017Full Text (via ProQuest)
Conference Proceeding eBook -
16
Cryptographic and security testing
Published 2008Online Access
Online Access
Government Document Electronic eBook -
17
-
18
Reconfigurable cryptographic processor /
Published 2018Table of Contents: “…Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- …”
Full Text (via Springer)
eBook -
19
-
20
Current Cryptographic Interests.
Published 2017Online Access (via OSTI)
Government Document Electronic eBook