Identity-based cryptography
Saved in:
| Other Authors: | Joye, Marc, Neven, Gregory |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam, The Netherlands
IOS Press
2009
|
| Series: | Crypotology and information security series
v. 2 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Satellite encryption
by: Vacca
Published: (1999)
by: Vacca
Published: (1999)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Cryptography a very short introduction
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2010)
by: Hoffstein, Jeffrey, et al.
Published: (2010)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
An introduction to cryptography
by: Mollin, Richard A. 1947-
Published: (2000)
by: Mollin, Richard A. 1947-
Published: (2000)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Windows Server 2008 PKI and certificate security
by: Komar, Brian
Published: (2008)
by: Komar, Brian
Published: (2008)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Foundations of cryptography
by: Goldreich, Oded
Published: (2003)
by: Goldreich, Oded
Published: (2003)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2014)
by: Hoffstein, Jeffrey, et al.
Published: (2014)
Introduction to cryptography
by: Padhye, Sahadeo, et al.
Published: (2018)
by: Padhye, Sahadeo, et al.
Published: (2018)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Similar Items
-
Cryptography protocols, design, and applications
Published: (2012) -
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010) -
7A Security's official guide cryptography
by: Burnett
Published: (2001) -
Cryptography, automata and learning theory
Published: (2011)


