skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 35  for All Library Resources

Results 1 2 next page
Refined by: resource type: References remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Survey of Quantum Key Distribution (QKD) Technologies
Material Type:
Reference
Add to My Research

A Survey of Quantum Key Distribution (QKD) Technologies

Emerging Trends in ICT Security, 2014, p.141-152

EISBN: 0124104878 ;EISBN: 9780124104877

Full text available

2
Password-based Authenticated Key Establishment Protocols
Material Type:
Reference
Add to My Research

Password-based Authenticated Key Establishment Protocols

Computer and Information Security Handbook, 2013, p.705-720

2013 Elsevier Inc. ;ISBN: 9780123943972 ;ISBN: 0123943973 ;EISBN: 0123946123 ;EISBN: 9780123946126

Full text available

3
Capacity-Approaching Channel Codes for Discrete Variable Quantum Key Distribution (QKD) Applications
Material Type:
Reference
Add to My Research

Capacity-Approaching Channel Codes for Discrete Variable Quantum Key Distribution (QKD) Applications

Wireless Networks and Security : Issues, Challenges and Research Trends, 2013, p.456

EISBN: 9783642361692 ;EISBN: 3642361692

Full text available

4
A Cryptography Primer
Material Type:
Reference
Add to My Research

A Cryptography Primer

Computer and Information Security Handbook, 2013, p.25-46

2013 Elsevier Inc. ;ISBN: 9780123943972 ;ISBN: 0123943973 ;EISBN: 0123946123 ;EISBN: 9780123946126

Full text available

5
Rank Estimation
Material Type:
Reference
Add to My Research

Rank Estimation

Encyclopedia of Cryptography, Security and Privacy, 2023, p.1-3

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-27739-9_1696-1

Digital Resources/Online E-Resources

6
Public Keys
Material Type:
Reference
Add to My Research

Public Keys

Simple Steps to Data Encryption: A Practical Guide to Secure Computing, 2013, p.23-39

EISBN: 0124078826 ;EISBN: 9780124078826

Full text available

7
Further Aspects of the Work and Its History Tony Sale Delves into the Cryptographic Background to — Alan Turing, the Enigma and the Bombe
Material Type:
Reference
Add to My Research

Further Aspects of the Work and Its History Tony Sale Delves into the Cryptographic Background to — Alan Turing, the Enigma and the Bombe

Alan Turing: His Work and Impact, 2013, p.426-431

EISBN: 0123870127 ;EISBN: 9780123870124

Full text available

8
Key Enumeration
Material Type:
Reference
Add to My Research

Key Enumeration

Encyclopedia of Cryptography, Security and Privacy, 2023, p.1-3

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-27739-9_1695-1

Digital Resources/Online E-Resources

9
Fundamentals of Cryptography
Material Type:
Reference
Add to My Research

Fundamentals of Cryptography

Cyber Security and IT Infrastructure Protection, 2014, p.295-307

EISBN: 9780124200470 ;EISBN: 0124200478

Full text available

10
Ransomware
Material Type:
Reference
Add to My Research

Ransomware

The SAGE Encyclopedia of the Internet, 2018, p.720-724

SAGE Publications Ltd 2018 ;ISBN: 9781473926615 ;ISBN: 1473926610 ;EISBN: 1473960355 ;EISBN: 9781473960350

Full text available

11
Fundamentals of Cryptography
Material Type:
Reference
Add to My Research

Fundamentals of Cryptography

Computer and Information Security Handbook, 2013, p.1031-1038

2013 Elsevier Inc. ;ISBN: 9780123943972 ;ISBN: 0123943973 ;EISBN: 0123946123 ;EISBN: 9780123946126

Full text available

12
Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes Against Side Channel Attacks
Material Type:
Reference
Add to My Research

Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes Against Side Channel Attacks

Wireless Networks and Security : Issues, Challenges and Research Trends, 2013, p.328

EISBN: 9783642361692 ;EISBN: 3642361692

Full text available

13
National Security Agency (NSA)
Material Type:
Reference
Add to My Research

National Security Agency (NSA)

Privacy Rights in the Digital Age, 2019, p.406-410

2019 Grey House Publishing, Inc. ;ISBN: 9781642650778 ;ISBN: 1642650773 ;EISBN: 9781642650785 ;EISBN: 1642650781

Full text available

14
Public Key Infrastructure
Material Type:
Reference
Add to My Research

Public Key Infrastructure

Cyber Security and IT Infrastructure Protection, 2014, p.75-107

EISBN: 9780124200470 ;EISBN: 0124200478

Full text available

15
Securing the Infrastructure
Material Type:
Reference
Add to My Research

Securing the Infrastructure

Cyber Security and IT Infrastructure Protection, 2014, p.247-267

EISBN: 9780124200470 ;EISBN: 0124200478

Full text available

16
System Security
Material Type:
Reference
Add to My Research

System Security

Cyber Security and IT Infrastructure Protection, 2014, p.233-246

EISBN: 9780124200470 ;EISBN: 0124200478

Full text available

17
System Security
Material Type:
Reference
Add to My Research

System Security

Computer and Information Security Handbook, 2013, p.993-1000

2013 Elsevier Inc. ;ISBN: 9780123943972 ;ISBN: 0123943973 ;EISBN: 0123946123 ;EISBN: 9780123946126

Full text available

18
Securing the Infrastructure
Material Type:
Reference
Add to My Research

Securing the Infrastructure

Computer and Information Security Handbook, 2013, p.1001-1013

2013 Elsevier Inc. ;ISBN: 9780123943972 ;ISBN: 0123943973 ;EISBN: 0123946123 ;EISBN: 9780123946126

Full text available

19
Blockchain
Material Type:
Reference
Add to My Research

Blockchain

The SAGE Encyclopedia of the Internet, 2018, p.59-64

SAGE Publications Ltd 2018 ;ISBN: 9781473926615 ;ISBN: 1473926610 ;EISBN: 1473960355 ;EISBN: 9781473960350

Full text available

20
Cryptocurrencies
Material Type:
Reference
Add to My Research

Cryptocurrencies

The SAGE Encyclopedia of the Internet, 2018, p.118-121

SAGE Publications Ltd 2018 ;ISBN: 9781473926615 ;ISBN: 1473926610 ;EISBN: 1473960355 ;EISBN: 9781473960350

Full text available

Results 1 - 20 of 35  for All Library Resources

Results 1 2 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Searching Remote Databases, Please Wait