skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 82  for All Library Resources

Results 1 2 3 4 5 next page
Refined by: resource type: Web Resources remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Oral History with Paul Kocher
Material Type:
Web Resources
Add to My Research

Oral History with Paul Kocher

Digital Resources/Online E-Resources

2
Minimal assumptions in cryptography
Material Type:
Web Resources
Add to My Research

Minimal assumptions in cryptography

Digital Resources/Online E-Resources

3
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War
Material Type:
Web Resources
Add to My Research

Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War

Digital Resources/Online E-Resources

4
De occultis literarum notis ... libri IV
Material Type:
Web Resources
Add to My Research

De occultis literarum notis ... libri IV

Digital Resources/Online E-Resources

5
Some hints for the design of digital chaos-based cryptosystems :lessons learned from cryptanalysis
Material Type:
Web Resources
Add to My Research

Some hints for the design of digital chaos-based cryptosystems :lessons learned from cryptanalysis

Digital Resources/Online E-Resources

6
"OU hosts first GenCyber Teachers camp"
Material Type:
Web Resources
Add to My Research

"OU hosts first GenCyber Teachers camp"

Copyright held by Oakland University

Digital Resources/Online E-Resources

7
Provable and Practical Security for Database Outsourcing
Material Type:
Web Resources
Add to My Research

Provable and Practical Security for Database Outsourcing

Digital Resources/Online E-Resources

8
Efficiency and Implementation Security of Code-based Cryptosystems
Material Type:
Web Resources
Add to My Research

Efficiency and Implementation Security of Code-based Cryptosystems

Digital Resources/Online E-Resources

9
On Privacy-Preserving Protocols for Smart Metering Systems
Material Type:
Web Resources
Add to My Research

On Privacy-Preserving Protocols for Smart Metering Systems

Digital Resources/Online E-Resources

10
Key Exchange at the Physical Layer
Material Type:
Web Resources
Add to My Research

Key Exchange at the Physical Layer

Digital Resources/Online E-Resources

11
El ataque polaco al protocolo Enigma
Material Type:
Web Resources
Add to My Research

El ataque polaco al protocolo Enigma

Digital Resources/Online E-Resources

12
Creación e implementación de un evento de ciberseguridad
Material Type:
Web Resources
Add to My Research

Creación e implementación de un evento de ciberseguridad

open access Aquest document està subjecte a una llicència d'ús Creative Commons. Es permet la reproducció total o parcial, la distribució, i la comunicació pública de l'obra, sempre que no sigui amb finalitats comercials, i sempre que es reconegui l'autoria de l'obra original. No es permet la creació d'obres derivades. https://creativecommons.org/licenses/by-nc-nd/4.0

Digital Resources/Online E-Resources

13
On the applicability of short key asymmetric cryptography in low power wireless sensor networks
Material Type:
Web Resources
Add to My Research

On the applicability of short key asymmetric cryptography in low power wireless sensor networks

Digital Resources/Online E-Resources

14
Trustworthy and privacy-preserving processing of personal information :cryptographic constructions, protocols, and tools
Material Type:
Web Resources
Add to My Research

Trustworthy and privacy-preserving processing of personal information :cryptographic constructions, protocols, and tools

Digital Resources/Online E-Resources

15
On a conjecture of balanced symmetric Boolean functions
Material Type:
Web Resources
Add to My Research

On a conjecture of balanced symmetric Boolean functions

This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.

Digital Resources/Online E-Resources

16
Matters of Coercion-Resistance in Cryptographic Voting Schemes
Material Type:
Web Resources
Add to My Research

Matters of Coercion-Resistance in Cryptographic Voting Schemes

Digital Resources/Online E-Resources

17
YourPass : una aplicació mòbil per a la gestió de contrasenyes online
Material Type:
Web Resources
Add to My Research

YourPass : una aplicació mòbil per a la gestió de contrasenyes online

open access Aquest document està subjecte a una llicència d'ús Creative Commons. Es permet la reproducció total o parcial, la distribució, i la comunicació pública de l'obra, sempre que no sigui amb finalitats comercials, i sempre que es reconegui l'autoria de l'obra original. No es permet la creació d'obres derivades. https://creativecommons.org/licenses/by-nc-nd/4.0

Digital Resources/Online E-Resources

18
SCA resistent implementation of the Montgomery kP-algorithm
Material Type:
Web Resources
Add to My Research

SCA resistent implementation of the Montgomery kP-algorithm

Digital Resources/Online E-Resources

19
Vulnerability assessment of an IHP ECC implementation
Material Type:
Web Resources
Add to My Research

Vulnerability assessment of an IHP ECC implementation

Digital Resources/Online E-Resources

20
Aplicació adaptada de gestió de contrasenyes per a mòbil
Material Type:
Web Resources
Add to My Research

Aplicació adaptada de gestió de contrasenyes per a mòbil

open access Aquest document està subjecte a una llicència d'ús Creative Commons. Es permet la reproducció total o parcial, la distribució, i la comunicació pública de l'obra, sempre que no sigui amb finalitats comercials, i sempre que es reconegui l'autoria de l'obra original. No es permet la creació d'obres derivades. https://creativecommons.org/licenses/by-nc-nd/4.0

Digital Resources/Online E-Resources

Results 1 - 20 of 82  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Searching Remote Databases, Please Wait