Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Subjects (1-50 of 106)
Data Encryption Computer Science
1
E-Book/E-Doc
 

Applications of secure multiparty computation



Amsterdam, [The Netherlands] : IOS Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
E-Book/E-Doc
 

Audio content security : attack analysis on audio watermarking


Ghorbani, Sogand, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
3
Print Material
 

Basic methods of cryptography


Lubbe, J. C. A. van der (Jan C. A.)
Cambridge, U.K. ; New York : Cambridge University Press, 1998. 1998

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 L961b    ---  Available
4
E-Book/E-Doc
 

Bent functions : results and applications to cryptography


Tokareva, Natalia, author.
London, UK : Elsevier Science, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
5
Print Material
 

Brute force : cracking the data encryption standard


Curtin, Matt.
New York : Copernicus Books, c2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C94b 2005    ---  Available
6
E-Book/E-Doc
 

Color image watermarking : algorithms and technologies


Su, Qingtang, author.
Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
7
E-Book/E-Doc
 

Cryptographic algorithms and key sizes for personal identity verification


Polk, W. Timothy.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-78    ---  Available
8
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943- author.
London : Academic Press, [2017] 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
9
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943-
Amsterdam ; Boston : Academic Press/Elsevier, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
10
E-Book/E-Doc
 

Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto


Grimes, Roger A., author.
Hoboken, New Jersey : Wiley, [2020] 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
11
E-Book/E-Doc
 

Cryptography protocols, design and applications



Hauppauge, N.Y. : Nova Science Publishers, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
12
E-Book/E-Doc
 

Data hiding fundamentals and applications : content security in digital media


Sencar, Husrev T.
Amsterdam ; Boston : Elsevier Academic Press, ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
13
E-Book/E-Doc
 

Data hiding techniques in Windows OS : a practical approach to investigation and defense


Hassan, Nihad Ahmad.
Cambridge, MA : Syngress, 2016, ©2017. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
14
E-Book/E-Doc
 

Decrypting the encryption debate : a framework for decision makers.



Washington, DC : The National Academies Press, [2018] 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
15
E-Book/E-Doc
 

Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certificati


Salam, Abdul, author.
Indianapolis, Indiana : John Wiley & Sons, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
16
Print Material
 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  323.448 El25    ---  Available
17
Print Material
 

Encryption and evolving technology : implications for U.S. law enforcement investigations


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2018- 2018

Rating:

Copies

18
E-Book/E-Doc
 

Evaluation of the SEC encryption program


United States. Securities and Exchange Commission. Office of Audits.
Washington, D.C. : U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  SE 1.42:476    ---  Available
19
E-Book/E-Doc
 

Group theoretic cryptography


Gonzalez Vasco, Maria Isabel, author.
Boca Raton, Florida ; London ; New York : CRC Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
20
E-Book/E-Doc
 

Hashing in computer science fifty years of slicing and dicing


Konheim, Alan G., 1934-
Hoboken, N.J. : John Wiley & Sons, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
21
E-Book/E-Doc
 

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis


Shavers, Brett, author.
Cambridge, MA : Syngress, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
22
E-Book/E-Doc
 

Identity-based cryptography



Amsterdam ; Boston : IOS Press, c2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
23
Print Material
 

Identity-based encryption


Chatterjee, Sanjit.
New York : Springer, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C392i 2011    ---  Available
24
E-Book/E-Doc
 

Implementing cryptography using python


Bray, Shannon, 1972- author.
Indianapolis, Indiana : Wiley, [2020] 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
25
E-Book/E-Doc
 

Implementing SSH strategies for optimizing the Secure Shell


Dwivedi, Himanshu.
Indianapolis, Ind. ; [Chichester] : Wiley, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
26
E-Book/E-Doc
 

Information hiding


Katzenbeisser, Stefan, author.
Boston, [Massachusetts] ; London, England : Artech House, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
27
Print Material
 

Introduction to blockchain technology : the many faces of blockchain technology in the 21st century


Laurence, Tiana, author.
[VW's-Hertogenbosch, NL] : Van Haren Publishing , 2019. 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.824 L373i 2019    ---  Available
28
Print Material
 

Introduction to cryptography with mathematical foundations and computer implementations


Stanoyevitch, Alexander.
Boca Raton : Chapman & Hall/CRC, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 St25i 2011    ---  Available
29
E-Book/E-Doc
 

Introduction to cryptography with open-source software


McAndrew, Alasdair, author.
Boca Raton, Florida ; London, [England] ; New York : CRC Press, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
30
E-Book/E-Doc
 

Introduction to identity-based encryption


Martin, Luther.
Boston : Artech House, c2008. 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
31
E-Book/E-Doc
 

The keyed-hash message authentication code (HMAC)


Information Technology Laboratory (National Institute of Standards and Technology)
Gaithersburg, MD : Information Technology Laboratory, U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:198-1    ---  Available
32
E-Book/E-Doc
 

Machine learning in image steganalysis


Schaathun, Hans Georg.
Hoboken : Wiley, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
33
E-Book/E-Doc
 

New directions of modern cryptography


Cao, Zhenfu.
Boca Raton : CRC Press, Taylor & Francis Group, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
34
E-Book/E-Doc
 

Next generation SSH2 implementation : securing data in motion


Liu, Dale.
Burlington, MA : Syngress Pub., ©2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
35
E-Book/E-Doc
 

Outsourcing information security


Axelrod, C. Warren.
Boston : Artech House, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
36
E-Book/E-Doc
 

Quantum cryptography and computing theory and implementation



Washington, D.C. : IOS Press, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
37
E-Book/E-Doc
 

Quantum cryptography potentially perfect security.



Boston, Mass. : Technology Research News, 2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
38
E-Book/E-Doc
 

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) and GMAC


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 D    ---  Available
39
E-Book/E-Doc
 

Recommendation for block cipher modes of operation methods and techniques


Dworkin, Morris
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 A    ---  Available
40
E-Book/E-Doc
 

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiali


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 C    ---  Available
41
E-Book/E-Doc
 

Recommendation for block cipher modes of operation the CMAC mode for authentication


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 B    ---  Available
42
E-Book/E-Doc
 

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revi


Barker, Elaine B.
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 A/REV.    ---  Available
43
E-Book/E-Doc
 

Recommendation for pair-wise key establishment schemes using integer factorization cryptography



[Gaithersburg, Md.] : National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 B    ---  Available
44
E-Book/E-Doc
 

Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher


Barker, William C. (William Curt)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-67/2011    ---  Available
45
E-Book/E-Doc
 

Relation based access control


Zhang, Rui.
Heidelberg, Germany : IOS Press : AKA, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
46
Print Material
 

RSA Security's official guide to cryptography


Burnett, Steve.
New York, N.Y. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 B934r    ---  Available
47
E-Book/E-Doc
 

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
48
E-Book/E-Doc
 

Securing record communications the TSEC/KW-26


Klein, Melville.
[Fort George G. Meade, Md. : National Security Agency, Central Security Service, 2003] 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:SE 2/11    ---  Available
49
E-Book/E-Doc
 

Security secrets, intruders and ID tags.



[Boston] : Technology Research News, 2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
50
E-Book/E-Doc
 

Security of block ciphers : from algorithm design to hardware implementation


Sakiyama, Kazuo, 1971- author.
Singapore : Wiley, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only