Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-47 of 47)
Data Encryption Computer Science
1
E-Book/E-Doc
 

Applications of secure multiparty computation



Amsterdam, [The Netherlands] : IOS Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
E-Book/E-Doc
 

Audio content security : attack analysis on audio watermarking


Ghorbani, Sogand, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
3
Print Material
 

Basic methods of cryptography


Lubbe, J. C. A. van der (Jan C. A.)
Cambridge, U.K. ; New York : Cambridge University Press, 1998. 1998

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 L961b    ---  Available
4
E-Book/E-Doc
 

Bent functions : results and applications to cryptography


Tokareva, Natalia, author.
London, UK : Elsevier Science, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
5
Print Material
 

Brute force : cracking the data encryption standard


Curtin, Matt.
New York : Copernicus Books, c2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C94b 2005    ---  Available
6
E-Book/E-Doc
 

Color image watermarking : algorithms and technologies


Su, Qingtang, author.
Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
7
E-Book/E-Doc
 

Cryptographic algorithms and key sizes for personal identity verification


Polk, W. Timothy.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-78    ---  Available
8
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943- author.
London : Academic Press, [2017] 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
9
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943-
Amsterdam ; Boston : Academic Press/Elsevier, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
10
E-Book/E-Doc
 

Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto


Grimes, Roger A., author.
Hoboken, New Jersey : Wiley, [2020] 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
11
E-Book/E-Doc
 

Cryptography protocols, design and applications



Hauppauge, N.Y. : Nova Science Publishers, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
12
E-Book/E-Doc
 

Data hiding fundamentals and applications : content security in digital media


Sencar, Husrev T.
Amsterdam ; Boston : Elsevier Academic Press, ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
13
E-Book/E-Doc
 

Data hiding techniques in Windows OS : a practical approach to investigation and defense


Hassan, Nihad Ahmad.
Cambridge, MA : Syngress, 2016, ©2017. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
14
E-Book/E-Doc
 

Decrypting the encryption debate : a framework for decision makers.



Washington, DC : The National Academies Press, [2018] 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
15
E-Book/E-Doc
 

Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certificati


Salam, Abdul, author.
Indianapolis, Indiana : John Wiley & Sons, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
16
Print Material
 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  323.448 El25    ---  Available
17
Print Material
 

Encryption and evolving technology : implications for U.S. law enforcement investigations


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2018- 2018

Rating:

Copies

18
E-Book/E-Doc
 

Evaluation of the SEC encryption program


United States. Securities and Exchange Commission. Office of Audits.
Washington, D.C. : U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  SE 1.42:476    ---  Available
19
E-Book/E-Doc
 

Group theoretic cryptography


Gonzalez Vasco, Maria Isabel, author.
Boca Raton, Florida ; London ; New York : CRC Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
20
E-Book/E-Doc
 

Hashing in computer science fifty years of slicing and dicing


Konheim, Alan G., 1934-
Hoboken, N.J. : John Wiley & Sons, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
21
E-Book/E-Doc
 

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis


Shavers, Brett, author.
Cambridge, MA : Syngress, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
22
E-Book/E-Doc
 

Identity-based cryptography



Amsterdam ; Boston : IOS Press, c2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
23
Print Material
 

Identity-based encryption


Chatterjee, Sanjit.
New York : Springer, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C392i 2011    ---  Available
24
E-Book/E-Doc
 

Implementing cryptography using python


Bray, Shannon, 1972- author.
Indianapolis, Indiana : Wiley, [2020] 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
25
E-Book/E-Doc
 

Implementing SSH strategies for optimizing the Secure Shell


Dwivedi, Himanshu.
Indianapolis, Ind. ; [Chichester] : Wiley, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
26
E-Book/E-Doc
 

Information hiding


Katzenbeisser, Stefan, author.
Boston, [Massachusetts] ; London, England : Artech House, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
27
Print Material
 

Introduction to blockchain technology : the many faces of blockchain technology in the 21st century


Laurence, Tiana, author.
[VW's-Hertogenbosch, NL] : Van Haren Publishing , 2019. 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.824 L373i 2019    ---  Available
28
Print Material
 

Introduction to cryptography with mathematical foundations and computer implementations


Stanoyevitch, Alexander.
Boca Raton : Chapman & Hall/CRC, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 St25i 2011    ---  Available
29
E-Book/E-Doc
 

Introduction to cryptography with open-source software


McAndrew, Alasdair, author.
Boca Raton, Florida ; London, [England] ; New York : CRC Press, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
30
E-Book/E-Doc
 

Introduction to identity-based encryption


Martin, Luther.
Boston : Artech House, c2008. 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
31
E-Book/E-Doc
 

The keyed-hash message authentication code (HMAC)


Information Technology Laboratory (National Institute of Standards and Technology)
Gaithersburg, MD : Information Technology Laboratory, U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:198-1    ---  Available
32
E-Book/E-Doc
 

Machine learning in image steganalysis


Schaathun, Hans Georg.
Hoboken : Wiley, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
33
E-Book/E-Doc
 

New directions of modern cryptography


Cao, Zhenfu.
Boca Raton : CRC Press, Taylor & Francis Group, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
34
E-Book/E-Doc
 

Next generation SSH2 implementation : securing data in motion


Liu, Dale.
Burlington, MA : Syngress Pub., ©2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
35
E-Book/E-Doc
 

Outsourcing information security


Axelrod, C. Warren.
Boston : Artech House, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
36
E-Book/E-Doc
 

Quantum cryptography and computing theory and implementation



Washington, D.C. : IOS Press, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
37
E-Book/E-Doc
 

Quantum cryptography potentially perfect security.



Boston, Mass. : Technology Research News, 2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
38
E-Book/E-Doc
 

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) and GMAC


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 D    ---  Available
39
E-Book/E-Doc
 

Recommendation for block cipher modes of operation methods and techniques


Dworkin, Morris
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 A    ---  Available
40
E-Book/E-Doc
 

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiali


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 C    ---  Available
41
E-Book/E-Doc
 

Recommendation for block cipher modes of operation the CMAC mode for authentication


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 B    ---  Available
42
E-Book/E-Doc
 

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revi


Barker, Elaine B.
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 A/REV.    ---  Available
43
E-Book/E-Doc
 

Recommendation for pair-wise key establishment schemes using integer factorization cryptography



[Gaithersburg, Md.] : National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 B    ---  Available
44
E-Book/E-Doc
 

Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher


Barker, William C. (William Curt)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-67/2011    ---  Available
45
E-Book/E-Doc
 

Relation based access control


Zhang, Rui.
Heidelberg, Germany : IOS Press : AKA, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
46
Print Material
 

RSA Security's official guide to cryptography


Burnett, Steve.
New York, N.Y. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 B934r    ---  Available
47
E-Book/E-Doc
 

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only