Data encryption (Computer science)
Overview
Works: | 392 works in 314 publications in 314 languages |
---|
Titles
Writing secure code = practical strategies and proven techniques for building secure applications in a networked world /
by:
(Language materials, printed)
Computer Security - ESORICS 2005 : = 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
by:
(Language materials, printed)
Image and Video Encryption = From Digital Rights Management to Secured Personal Communication /
by:
(Language materials, printed)
Networked RFID Systems and Lightweight Cryptography = Raising Barriers to Product Counterfeiting /
by:
(Language materials, printed)
Understanding cryptography = a textbook for students and practitioners /
by:
(Language materials, printed)
Selected areas in cryptography = 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings /
by:
(Language materials, printed)
Secure data management = 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(Language materials, printed)
Information theoretic security = 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Language materials, printed)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(Language materials, printed)
Information security and assurance = 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Language materials, printed)
Progress in cryptology - LATINCRYPT 2010 = First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings/
by:
(Language materials, printed)
Financial cryptography and data security = FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, revised selected papers /
by:
(Language materials, printed)
Security and privacy - silver linings in the cloud = 25th IFIP TC-11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings/
by:
(Language materials, printed)
Applied cryptography for cyber security and defense = information encryption and cyphering /
by:
(Electronic resources)
Chaos synchronization and cryptography for secure communications = applications for encryption /
by:
(Electronic resources)
Information security = 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Theory of quantum computation, communication and cryptography = 5th conference, TQC 2010, Leeds, UK, April 13-15, 2010 : revised selected papers /
by:
(Electronic resources)
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology = CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography = 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers /
by:
(Electronic resources)
RFID: Security and privacy = 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of security and applications = Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011 : revised selected papers /
by:
(Electronic resources)
Information security applications = 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2012 = the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems = 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
Cryptography and security = from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Selected areas in cryptography = 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Electronic resources)
Security and trust management = 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011, Revised selected papers /
by:
(Electronic resources)
Public key cryptography - PKC 2012 = 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012 : proceedings /
by:
(Electronic resources)
Digital forensics and watermarking = 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011 : revised selected papers /
by:
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
Engineering secure two-party computation protocols = design, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2012 = 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012 : proceedings /
by:
(Electronic resources)
Information theoretic security = 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Secure data management = 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Security and privacy in communication networks = 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
E-voting and identity = third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Fast software encryption = 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Theory of quantum computation, communication, and cryptography = third workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2012 = 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Multilaterally secure pervasive cooperation = privacy protection, accountability and secure communication for the age of pervasive computing /
by:
(Electronic resources)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2013 = 6th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(Electronic resources)
Privacy technologies and policy = first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2014 = the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems = 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : proceedings /
by:
(Electronic resources)
Public-key cryptography - PKC 2014 = 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings /
by:
(Electronic resources)
Foundations and practice of security = 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience = 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2014 = 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography - SAC 2013 = 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(Electronic resources)
Information security and privacy = 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(Electronic resources)
Digital-forensics and watermarking = 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013 : revised selected papers /
by:
(Electronic resources)
Fast software encryption = 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2014 = 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2014 = 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.. Part II /
by:
(Electronic resources)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Visual cryptography for image processing and security = theory, methods, and applications /
by:
(Electronic resources)
Trustworthy reconfigurable systems = enhancing the security capabilities of reconfigurable hardware architectures /
by:
(Electronic resources)
Cryptography and security systems = Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2014 = 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.. Part I /
by:
(Electronic resources)
Computer security - ESORICS 2014 = 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.. Part II /
by:
(Electronic resources)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(Electronic resources)
Post-quantum cryptography = 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2014 = 16th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(Electronic resources)
Secure IT systems = 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014 : proceedings /
by:
(Electronic resources)
Information security and cryptology = 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 2013 = 16th International Conference, Seoul, Korea, November 27-29, 2013 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security = 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : proceedings /
by:
(Electronic resources)
Security protocols XXII = 22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(Electronic resources)
Future data and security engineering = first International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2014 = 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers /
by:
(Electronic resources)
Information security = 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2014 = 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.. Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2014 = 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.. Part I /
by:
(Electronic resources)
Information systems security = 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Security protocols XVIII = 18th International Workshop, Cambridge, UK, March 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Engineering secure software and systems = 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2014 = 17th International Conference, Seoul, South Korea, December 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2014 = third International Conference on Cryptology and Information Security in Latin America Florianopolis, Brazil, September 17–19, 2014 : revised selected papers /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2015 = the Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015 : proceedings /
by:
(Electronic resources)
Information security and cryptology = 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Trust management IX = 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Foundations and practice of security = 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Fast software encryption = 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Simple steps to data encryption = a practical guide to secure computing /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015 : proceedings /
by:
(Electronic resources)
Codes, cryptology, and information security = first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015 : proceedings - In Honor of Thierry Berger /
by:
(Electronic resources)
Information security and privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Human aspects of information security, privacy, and trust = third International Conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015 : proceedings /
by:
(Electronic resources)
Cryptography and information security in the Balkans = first International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Information and communications security = 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2015 = 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Electronic resources)
Information security = 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 : proceedings /
by:
(Electronic resources)
Fast software encryption = 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2015 = 17th International Workshop, Saint-Malo, France, September 13-16, 2015 : proceedings /
by:
(Electronic resources)
Global security, safety and sustainability = tomorrow's challenges of cyber security : 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015 : proceedings /
by:
(Electronic resources)
Visual cryptography for image processing and security = theory, methods, and applications /
by:
(Electronic resources)
Advances in Digital Forensics XI = 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Electronic resources)
Advanced concepts for intelligent vision systems = 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Electronic resources)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Electronic resources)
Future data and security engineering = second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Electronic resources)
Information systems security and privacy = first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptography and coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Electronic resources)
Innovative security solutions for information technology and communications = 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Electronic resources)
Practical cryptography : = algorithms and implementations using C++ /
by:
(Language materials, printed)
Theory of cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Theory of cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXIII = selected papers from FDSE 2014 /
by:
(Electronic resources)
Post-quantum cryptography = 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2016 = the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Electronic resources)
Lightweight cryptography for security and privacy = 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptography and information security in the Balkans = second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015 : revised selected papers /
by:
(Electronic resources)
Privacy technologies and policy = third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Intelligence and security informatics = 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings /
by:
(Electronic resources)
Digital-forensics and watermarking = 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers /
by:
(Electronic resources)
The new codebreakers = essays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(Electronic resources)
Principles of security and trust = 5th International Conference, POST 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, the Netherlands, April 2-8, 2016 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2016 = 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust = 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016 : revised selected papers /
by:
(Electronic resources)
Fast software encryption = 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part III /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Security of block ciphers = from algorithm design to hardware implementation /
by:
(Electronic resources)
Security and cryptography for networks = 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security = 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2016 = 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXXI = special issue on data and security engineering /
by:
(Electronic resources)
Handbook of research on modern cryptographic solutions for computer and cyber security
by:
(Electronic resources)
Tutorials on the foundations of cryptography = dedicated to Oded Goldreich /
by:
(Electronic resources)
Advances in digital forensics XIII = 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Electronic resources)
Verifiable composition of signature and encryption = a comprehensive study of the design paradigms /
by:
(Electronic resources)
Practical cryptography in Python = learning correct cryptography by example /
by:
(Electronic resources)
Modern cryptography = applied mathematics for encryption and information security /
by:
(Electronic resources)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(Electronic resources)
Blockchain technology and application = third CCF China blockchain conference, CBCC 2020, Jinan, China, December 18-20, 2020 : revised selected papers /
by:
(Electronic resources)
Quantum cryptography = from key distribution to conference key agreement /
by:
(Electronic resources)
Security in computing and communications = 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020 : revised selected papers /
by:
(Electronic resources)
Cryptography with shrinking generators = fundamentals and applications of keystream sequence generators based on irregular decimation /
by:
(Electronic resources)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(Electronic resources)
Energy-efficient modular exponential techniques for public-key cryptography = efficient modular exponential techniques /
by:
(Electronic resources)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
by:
(Electronic resources)
Hiding behind the keyboard = uncovering covert communication methods with forensic analysis /
by:
(Electronic resources)
Cryptography apocalypse = preparing for the day when quantum computing breaks today's crypto /
by:
(Electronic resources)
Algorithms and architectures for cryptography and source coding in non-volatile flash memories
by:
(Electronic resources)
New frontiers in cryptography = quantum, blockchain, lightweight, chaotic and DNA /
by:
(Electronic resources)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(Electronic resources)
Security and cryptography for networks = 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020 : proceedings /
by:
(Electronic resources)
Hardware oriented authenticated encryption based on tweakable block ciphers
by:
(Electronic resources)
Guide to internet cryptography = security protocols and real-world attack implications /
by:
(Electronic resources)
Pro encryption in SQL Server 2022 = provide the highest level of protection for your data /
by:
(Electronic resources)
Homomorphic encryption for financial cryptography = recent inventions and challenges /
by:
(Electronic resources)
Future data and security engineering = big data, security and privacy, smart city and industry 4.0 applications : 10th International Conference, FDSE 2023, Da Nang, Vietnam, November 22-24, 2023 : proceedings /
by:
(Electronic resources)
Data hiding fundamentals and applications = content security in digital media /
by:
(Language materials, printed)
Image and video encryption = from digital rights management to secured personal communication /
by:
(Language materials, printed)
Selected areas in cryptography = 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002 : revised papers /
by:
(Language materials, printed)
Radio frequency identification = security and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Language materials, printed)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Language materials, printed)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Language materials, printed)
Theory of cryptography = 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
Security and intelligent information systems = International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust = first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneus security = 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2012 = 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Anonymous security systems and applications = requirements and solutions /
by:
(Language materials, printed)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Information security and privacy = 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2011 = 14th International Conference, Seoul, Korea, November 30 - December 2, 2011 : revised aelected papers /
by:
(Electronic resources)
Financial cryptography and data security = 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012 : revised selected papers /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2012 = 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012 : proceedings /
by:
(Electronic resources)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Research in cryptology = 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in information and computer security = 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Post-quantum cryptography = second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Electronic resources)
Research in cryptology = second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Electronic resources)
Network computing and information security = second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Electronic resources)
Security protocols XX = 20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(Electronic resources)
Everyday cryptography : = fundamental principles and applications /
by:
(Language materials, printed)
Multimedia information hiding technologies and methodologies for controlling data
by:
(Electronic resources)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Transactions on data hiding and multimedia security IX = Special Issue on Visual Cryptography /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2014 = 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings /
by:
(Electronic resources)
Privacy technologies and policy = second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014 : proceedings /
by:
(Electronic resources)
Secure data management = 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Platform embedded security technology revealed = safeguarding the future of computing with intel embedded security and management engine /
by:
(Electronic resources)
Provable security = 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(Electronic resources)
Attribute-based credentials for trust = identity in the information society /
by:
(Electronic resources)
Accountability and security in the cloud = First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014 : revised selected papers and lectures /
by:
(Electronic resources)
Theory of cryptography = 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Theory of cryptography = 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Principles of security and trust = 4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
by:
(Electronic resources)
Information theoretic security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015 : revised selected papers /
by:
(Electronic resources)
E-Voting and identity = 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Technology and practice of passwords = International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Electronic resources)
Security and trust management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Electronic resources)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2015 = 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Electronic resources)
Internet of vehicles - safe and intelligent mobility = second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2015 = 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Information security = 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013 : proceedings /
by:
(Electronic resources)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security = 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Electronic resources)
Data privacy management, and security assurance = 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security = 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems = 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2015 = 18th International Conference, Seoul, South Korea, November 25-27, 2015 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications = 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography - SAC 2015 = 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015 : revised selected papers /
by:
(Electronic resources)
Hiding data - selected topics = Rudolf Ahlswede's lectures on information theory 3 /
by:
(Electronic resources)
Cryptology transmitted message protection = from deterministic chaos up to optical vortices /
by:
(Electronic resources)
Trust management X = 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 : proceedings /
by:
(Electronic resources)
Multimedia forensics and security = foundations, innovations, and applications /
by:
(Electronic resources)
Pro cryptography and cryptanalysis = creating advanced algorithms with C# and .NET /
by:
(Electronic resources)
Building decentralized trust = multidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(Electronic resources)
Pro cryptography and cryptanalysis with C++20 = creating and programming advanced algorithms /
by:
(Electronic resources)
Learn blockchain by building one = a concise path to understanding cryptocurrencies /
by:
(Electronic resources)
Stream ciphers in modern real-time IT systems = analysis, design and comparative studies /
by:
(Electronic resources)
Classical and physical security of symmetric key cryptographic algorithms
by:
(Electronic resources)
Information security technologies in the decentralized distributed networks
by:
(Electronic resources)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(Electronic resources)
An introduction to secret sharing = a systematic overview and guide for protocol selection /
by:
(Electronic resources)
Show more
Fewer
Subjects