|
1
|
|
Data Encryption Computer Science -- See Also Cryptography
--subdivision Cryptography under individual wars, e.g. World War, 1939-1945--Cryptography
|
|
|
2
|
|
Data Encryption Computer Science
|
|
|
Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
Axe ProQuest E-Book:Available
|
|
2015
|
Audio content security : attack analysis on audio watermarking / Sogand Ghorbani, Iraj Sadegh Amiri.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2016
|
Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee.
Axe 3rd Floor Stacks:Available
|
|
1998
|
Bent functions : results and applications to cryptography / by Natalia Tokareva, Sobolev Institute of
Axe ProQuest E-Book:Available
|
|
2015
|
56 additional entries
|
|
|
3
|
|
Data Encryption Computer Science Bibliography : Buydos, John F.,
|
|
|
Cryptology [electronic resource] / [compiled by John F. Buydos with David Kahn].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
1996
|
4
|
|
Data Encryption Computer Science Computer Networks United States : United States.
|
|
|
U.S. Citizenship and Immigration Services' laptop safeguards need improvements / Department of Homela
Axe Federal Documents Online:Available
|
|
2012
|
5
|
|
Data Encryption Computer Science Congresses
|
|
|
Algorithmic problems of group theory, their complexity, and applications to cryptography / Delaram Ka
Axe ProQuest E-Book:Available
|
|
2015
|
Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed
Axe ProQuest E-Book:Available
|
|
2016
|
Modelling cyber security [electronic resource] : approaches, methodology, strategies / edited by Umbe
Axe ProQuest E-Book:Available
|
|
2009
|
6
|
|
Data Encryption Computer Science Equipment And Supplies Standards United States : Iorga, Michaela.
|
|
|
Cryptographic and security testing [electronic resource] / Michaela Iorga and Carroll Brickenkamp.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
7
|
|
Data Encryption Computer Science Examinations Study Guides : Bayer, Chad M.
|
|
|
ExamWise for CIW security professional [electronic resource] : exam 1D0-470 / Chad M. Bayer.
Axe ProQuest E-Book:Available
|
|
2003
|
8
|
|
Data Encryption Computer Science Government Policy United States
|
|
|
Securing data for a post-quantum world / GAO, Science, Technology Assesment, and Analytics.
Axe Federal Documents Online:Available
|
|
2023
|
Surveillance or security? [electronic resource] : the risks posed by new wiretapping technologies / S
Axe ProQuest E-Book:Available
|
|
2010
|
9
|
|
Data Encryption Computer Science Government Policy United States Congresses : Johnson, Anne,
|
|
|
Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed
Axe ProQuest E-Book:Available
|
|
2016
|
10
|
|
Data Encryption Computer Science Handbooks Manuals Etc : National Institute of Standards and Technology (U.S.)
|
|
|
Secure hash standard (SHS) [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
11
|
|
Data Encryption Computer Science History : Dooley, John,
|
|
|
History of cryptography and cryptanalysis : codes, ciphers, and their algorithms / John F. Dooley.
Axe 2nd Floor Stacks:Available
|
|
2018
|
12
|
|
Data Encryption Computer Science Law And Legislation
|
|
|
Burdens of proof [electronic resource] : cryptographic culture and evidence law in the age of electro
Axe ProQuest E-Book:Available
|
|
2012
|
Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister.
Axe JSTOR Open Ebooks:Available
|
|
2016
|
13
|
|
Data Encryption Computer Science Law And Legislation Great Britain : Mason, Stephen
|
|
|
Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister.
Axe JSTOR Open Ebooks:Available
|
|
2016
|
14
|
|
Data Encryption Computer Science Law And Legislation United States
|
|
|
Digital Millennium Copyright Act section 104 report : hearing before the Subcommittee on Courts, the
Axe Federal Documents Online:Available
|
|
2002
|
Electronic Signatures in Global and National Commerce Act [electronic resource] : conference report (
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Electronic Signatures in Global and National Commerce Act [electronic resource] : the consumer consen
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Encryption : frequently asked questions / Chris Jaikaran.
Axe Federal Documents Online:Available
|
|
2018
|
4 additional entries
|
|
|
15
|
|
Data Encryption Computer Science Mathematics
|
|
|
Guide to pairing-based cryptography / edited by Nadia El Mrabet, SAS-Ecole des Mines de Saint Etienne
Axe ProQuest E-Book:Available
|
|
2017
|
16
|
|
Data Encryption Computer Science Periodicals
|
|
|
ACM transactions on information and system security.
Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available
|
|
1998
|
17
|
|
Data Encryption Computer Science Standards
|
|
|
Announcing the Advanced Encryption Standard (AES) [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone,
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) [electronic res
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
18
|
|
Data Encryption Computer Science Standards United States
|
|
|
Recommendation for existing application-specific key derivation functions [electronic resource] / Quy
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Recommendation for key management. Part 1, General / Elaine Barker [and others].
Axe Federal Documents Online:Available
|
|
2006
|
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
4 additional entries
|
|
|
19
|
|
Data Encryption Computer Science Technological Innovations : United States.
|
|
|
The audio and video flags [electronic resource] : can content protection and technological innovation
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
20
|
|
Data Encryption Computer Science United States
|
|
|
Audit of the Executive Office for United States Attorneys' laptop computer and electronic tablet encr
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2014
|
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Encryption, key recovery, and privacy protection in the information age : hearing before the Committe
Axe Federal Documents Online:Available
|
|
1997
|
2 additional entries
|
|
|
21
|
|
Data Encryption Computer Science United States Evaluation : United States.
|
|
|
Information security [electronic resource] : federal agency efforts to encrypt sensitive information
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Add Marked to Bag
Add All On Page
|