Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
1
2
3
Publicado 2017
Materias:
“...Computer security....”
eBook
4
Publicado 2017
Tabla de Contenidos:
“... -- Similarity Based Interactive Private Information Retrieval -- A Secure and Efficient Implementation...”
eBook
5
Publicado 2017
Tabla de Contenidos:
“...'s.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures...”
eBook
6
Publicado 2017
Materias:
“...Computer security....”
eBook
7
Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING...
Publicado 2017
Tabla de Contenidos:
“...Encrypted Computing and Applied Homomorphic Cryptography -- Bitcoin and Blockchain Research...”
eBook
8
Publicado 2017
Materias:
“...Computer security....”
eBook
9
Publicado 2017
Materias:
“...Computer security....”
eBook
10
Publicado 2017
Materias:
“...Computer security....”
eBook
11
Publicado 2017
Tabla de Contenidos:
“... Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions...”
eBook
12
Publicado 2017
Tabla de Contenidos:
“...Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices...”Enlace del recurso
eBook
13
Publicado 2017
Tabla de Contenidos:
“... encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network...”Enlace del recurso
eBook
14
Publicado 2017
Tabla de Contenidos:
“... encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network...”Enlace del recurso
eBook
15
Publicado 2017
Tabla de Contenidos:
“...Privacy/cryptography -- Systems security -- Security analysis -- Identity management and access...”Enlace del recurso
eBook
16
Publicado 2017
Tabla de Contenidos:
“... encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves...”
eBook
17
por Kizza, Joseph Migga.
Publicado 2017
Tabla de Contenidos:
“...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...”Publicado 2017
Enlace del recurso
eBook
18
Publicado 2010
Tabla de Contenidos:
“... Information Security -- Bio-Cryptography -- Quantum Cryptography -- Intrusion Detection and Access Control...”
eBook
19
Publicado 2017
Tabla de Contenidos:
“...Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography...”
eBook
20
Publicado 2017
Tabla de Contenidos:
“... Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key...”Enlace del recurso
eBook