Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Subjects (1-50 of 106)
Data Encryption Computer Science
1
E-Books/E-Docs
 

Applications of secure multiparty computation



Amsterdam, [The Netherlands] : IOS Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
Print Material
 

Basic methods of cryptography


Lubbe, J. C. A. van der (Jan C. A.)
Cambridge, U.K. ; New York : Cambridge University Press, 1998. 1998

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 L961b    ---  Available
3
E-Books/E-Docs
 

Bent functions : results and applications to cryptography


Tokareva, Natalia, author.
London, UK : Elsevier Science, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
4
Print Material
 

Brute force : cracking the data encryption standard


Curtin, Matt.
New York : Copernicus Books, c2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C94b 2005    ---  Available
5
E-Books/E-Docs
 

Color image watermarking : algorithms and technologies


Su, Qingtang, author.
Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
6
E-Books/E-Docs
 

Cryptographic algorithms and key sizes for personal identity verification


Polk, W. Timothy.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-78    ---  Available
7
E-Books/E-Docs
 

Cryptography protocols, design and applications



Hauppauge, N.Y. : Nova Science Publishers, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
8
E-Books/E-Docs
 

Decrypting the encryption debate : a framework for decision makers.



Washington, DC : The National Academies Press, [2018] 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
9
E-Books/E-Docs
 

Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certificati


Salam, Abdul, author.
Indianapolis, Indiana : John Wiley & Sons, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
10
Print Material
 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  323.448 El25    ---  Available
11
E-Books/E-Docs
 

Evaluation of the SEC encryption program


United States. Securities and Exchange Commission. Office of Audits.
Washington, D.C. : U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  SE 1.42:476    ---  Available
12
E-Books/E-Docs
 

Hashing in computer science fifty years of slicing and dicing


Konheim, Alan G., 1934-
Hoboken, N.J. : John Wiley & Sons, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
13
E-Books/E-Docs
 

Identity-based cryptography



Amsterdam ; Boston : IOS Press, c2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
14
Print Material
 

Identity-based encryption


Chatterjee, Sanjit.
New York : Springer, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C392i 2011    ---  Available
15
E-Books/E-Docs
 

Implementing SSH strategies for optimizing the Secure Shell


Dwivedi, Himanshu.
Indianapolis, Ind. ; [Chichester] : Wiley, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
16
E-Books/E-Docs
 

Information hiding


Katzenbeisser, Stefan, author.
Boston, [Massachusetts] ; London, England : Artech House, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
17
Print Material
 

Introduction to blockchain technology : the many faces of blockchain technology in the 21st century


Laurence, Tiana, author.
[VW's-Hertogenbosch, NL] : Van Haren Publishing , 2019. 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.824 L373i 2019    ---  Available
18
Print Material
 

Introduction to cryptography with mathematical foundations and computer implementations


Stanoyevitch, Alexander.
Boca Raton : Chapman & Hall/CRC, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 St25i 2011    ---  Available
19
E-Books/E-Docs
 

Introduction to cryptography with open-source software


McAndrew, Alasdair, author.
Boca Raton, Florida ; London, [England] ; New York : CRC Press, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
20
E-Books/E-Docs
 

Introduction to identity-based encryption


Martin, Luther.
Boston : Artech House, c2008. 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
21
E-Books/E-Docs
 

The keyed-hash message authentication code (HMAC)


Information Technology Laboratory (National Institute of Standards and Technology)
Gaithersburg, MD : Information Technology Laboratory, U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:198-1    ---  Available
22
E-Books/E-Docs
 

Machine learning in image steganalysis


Schaathun, Hans Georg.
Hoboken : Wiley, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
23
E-Books/E-Docs
 

New directions of modern cryptography


Cao, Zhenfu.
Boca Raton : CRC Press, Taylor & Francis Group, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
24
E-Books/E-Docs
 

Outsourcing information security


Axelrod, C. Warren.
Boston : Artech House, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
25
E-Books/E-Docs
 

Quantum cryptography and computing theory and implementation



Washington, D.C. : IOS Press, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
26
E-Books/E-Docs
 

Quantum cryptography potentially perfect security.



Boston, Mass. : Technology Research News, 2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
27
E-Books/E-Docs
 

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) and GMAC


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 D    ---  Available
28
E-Books/E-Docs
 

Recommendation for block cipher modes of operation methods and techniques


Dworkin, Morris
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 A    ---  Available
29
E-Books/E-Docs
 

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiali


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 C    ---  Available
30
E-Books/E-Docs
 

Recommendation for block cipher modes of operation the CMAC mode for authentication


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 B    ---  Available
31
E-Books/E-Docs
 

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revi


Barker, Elaine B.
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 A/REV.    ---  Available
32
E-Books/E-Docs
 

Recommendation for pair-wise key establishment schemes using integer factorization cryptography



[Gaithersburg, Md.] : National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 B    ---  Available
33
E-Books/E-Docs
 

Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher


Barker, William C. (William Curt)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-67/2011    ---  Available
34
E-Books/E-Docs
 

Relation based access control


Zhang, Rui.
Heidelberg, Germany : IOS Press : AKA, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
35
Print Material
 

RSA Security's official guide to cryptography


Burnett, Steve.
New York, N.Y. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 B934r    ---  Available
 Axe Compact Discs 1st Floor  005.82 B934r    ---  Available
36
E-Books/E-Docs
 

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
37
E-Books/E-Docs
 

Securing record communications the TSEC/KW-26


Klein, Melville.
[Fort George G. Meade, Md. : National Security Agency, Central Security Service, 2003] 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:SE 2/11    ---  Available
38
E-Books/E-Docs
 

Security secrets, intruders and ID tags.



[Boston] : Technology Research News, 2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
39
E-Books/E-Docs
 

Security of block ciphers : from algorithm design to hardware implementation


Sakiyama, Kazuo, 1971- author.
Singapore : Wiley, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
40
Print Material
 

SSH, the secure shell : the definitive guide


Barrett, Daniel J.
Cambridge [Mass.] : O'Reilly, 2001. 2001

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.8 B275s 2001    ---  Available
41
E-Books/E-Docs
 

A statistical test suite for random and pseudorandom number generators for cryptographic application



Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-22/2008    ---  Available
42
E-Books/E-Docs
 

Trusted platform module basics using TPM in embedded systems


Kinney, Steven.
Amsterdam ; Boston : Elsevier Newnes, c2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
43
E-Books/E-Docs
 

Understanding bitcoin : cryptography, engineering and economics.


Franco, Pedro, author.
Chichester, West Sussex, [England] : John Wiley & Sons, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
44
E-Books/E-Docs
 

Video encryption technology and application


Xu, Zhengquan, 1962-
New York : Nova Science Publishers, c2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
45
E-Books/E-Docs
 

Visual cryptography and secret image sharing



Boca Raton, FL : CRC Press, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
46
Print Material
 

Writing secure code


Howard, Michael, 1965-
Redmond, Wash. : Microsoft Press, c2003. 2003

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.8 H835w 2003    ---  Available
Data Encryption Computer Science Bibliography
47
E-Books/E-Docs
 

Cryptology


Buydos, John F., compiler.
[Washington, D.C.] : Library of Congress, Science, Technology & Business Division, Science Reference Services, [1996] 1996

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 33.10:96-2    ---  Available
Data Encryption Computer Science Computer Networks United States
48
E-Books/E-Docs
 

U.S. Citizenship and Immigration Services' laptop safeguards need improvements


United States. Department of Homeland Security. Office of Inspector General, author.
Washington, DC : Department of Homeland Security, Office of Inspector General, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 1.22:12-83    ---  Available
Data Encryption Computer Science Congresses
49
E-Books/E-Docs
 

Algorithmic problems of group theory, their complexity, and applications to cryptography



Providence, Rhode Island : American Mathematical Society, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
50
E-Books/E-Docs
 

Exploring encryption and potential mechanisms for authorized government access to plaintext : procee


Johnson, Anne, author.
Washington, District of Columbia : The National Academies Press, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only