Cryptography,information theory,and error-correction a handbook for the 21st century
Saved in:
| Main Author: | Bruen |
|---|---|
| Other Authors: | Forcinito |
| Format: | Book |
| Published: |
new Jersey
John Wiley & Sons
2005
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Enhancing cryptographic primitives with techniques from error correcting codes
Published: (2009)
Published: (2009)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Cryptography a very short introduction
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
Identity-based cryptography
Published: (2009)
Published: (2009)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Error correcting coding and security for data networks analysis of the superchannel concept
by: Kabatiansky
Published: (2005)
by: Kabatiansky
Published: (2005)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2010)
by: Hoffstein, Jeffrey, et al.
Published: (2010)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
An introduction to cryptography
by: Mollin, Richard A. 1947-
Published: (2000)
by: Mollin, Richard A. 1947-
Published: (2000)
Managing information security
Published: (2014)
Published: (2014)
Information protection playbook
Published: (2013)
Published: (2013)
Dissappearing cryptography information hiding steganography & watermarking
by: Wayner, Peter 1964-
Published: (2009)
by: Wayner, Peter 1964-
Published: (2009)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Similar Items
-
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015) -
Contemporary cryptology the science of information integrity
Published: (1992) -
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996) -
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008) -
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)


