Tomeki

Explore Books on
data encryption

1-24 of 409 Books

View Ethical and social issues in the information age By Joseph Migga Kizza
Cover of Ethical and social issues in the information age by joseph migga kizza

Ethical and social issues in the information age

By Joseph Migga Kizza

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View Information Security and Cryptology By Dongdai Lin,Shouhuai Xu,Moti Yung
Cover of Information Security and Cryptology by dongdai lin,shouhuai xu,moti yung

Information Security and Cryptology

By Dongdai Lin,Shouhuai Xu,Moti Yung

View Digital Forensics and Watermarking By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu
Cover of Digital Forensics and Watermarking by yun qing shi,hyoung joong kim,fernando perez-gonzalez,feng liu

Digital Forensics and Watermarking

By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu

View Secure data management By Willem Jonker,Milan Petkovic
Cover of Secure data management by willem jonker,milan petkovic

Secure data management

By Willem Jonker,Milan Petkovic

View Future Data and Security Engineering By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai
Cover of Future Data and Security Engineering by tran khanh dang,roland wagner,erich j. neuhold,makoto takizawa,josef küng,nam thoai

Future Data and Security Engineering

By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai

View Multiple Access Communications By Boris Bellalta
Cover of Multiple Access Communications by boris bellalta

Multiple Access Communications

By Boris Bellalta

View Applications and Techniques in Information Security By Lynn Batten,Gang Li
Cover of Applications and Techniques in Information Security by lynn batten,gang li

Applications and Techniques in Information Security

By Lynn Batten,Gang Li

View Advances in Information Technology By Borworn Papasratorn,Nipon Charoenkitkarn,Kittichai Lavangnananda,Wichian Chutimaskul,Vajirasak Vanijja
Cover of Advances in Information Technology by borworn papasratorn,nipon charoenkitkarn,kittichai lavangnananda,wichian chutimaskul,vajirasak vanijja

Advances in Information Technology

By Borworn Papasratorn,Nipon Charoenkitkarn,Kittichai Lavangnananda,Wichian Chutimaskul,Vajirasak Vanijja

View Prime numbers and computer methods for factorization By Hans Riesel
Cover of Prime numbers and computer methods for factorization by hans riesel

Prime numbers and computer methods for factorization

By Hans Riesel

View Policies and Research in Identity Management By Simone Fischer-Hübner
Cover of Policies and Research in Identity Management by simone fischer-hübner

Policies and Research in Identity Management

By Simone Fischer-Hübner

View Communications and Multimedia Security By Bart De Decker,David W. Chadwick
Cover of Communications and Multimedia Security by bart de decker,david w. chadwick

Communications and Multimedia Security

By Bart De Decker,David W. Chadwick

View Trust, Privacy and Security in Digital Business By Steven Furnell
Cover of Trust, Privacy and Security in Digital Business by steven furnell

Trust, Privacy and Security in Digital Business

By Steven Furnell

View Privacy and Identity Management for Life By Simone Fischer-Hübner
Cover of Privacy and Identity Management for Life by simone fischer-hübner

Privacy and Identity Management for Life

By Simone Fischer-Hübner

View Trustworthy Computing and Services By Yuyu Yuan,Xu Wu,Yueming Lu
Cover of Trustworthy Computing and Services by yuyu yuan,xu wu,yueming lu

Trustworthy Computing and Services

By Yuyu Yuan,Xu Wu,Yueming Lu

View Recent Trends in Computer Networks and Distributed Systems Security By Sabu M. Thampi
Cover of Recent Trends in Computer Networks and Distributed Systems Security by sabu m. thampi

Recent Trends in Computer Networks and Distributed Systems Security

By Sabu M. Thampi

View Trust, Privacy and Security in Digital Business By Simone Fischer-Hübner
Cover of Trust, Privacy and Security in Digital Business by simone fischer-hübner

Trust, Privacy and Security in Digital Business

By Simone Fischer-Hübner

View Engineering Secure Software and Systems By Jan Jürjens
Cover of Engineering Secure Software and Systems by jan jürjens

Engineering Secure Software and Systems

By Jan Jürjens

View Information Security and Privacy By Colin Boyd
Cover of Information Security and Privacy by colin boyd

Information Security and Privacy

By Colin Boyd

View Information Security and Privacy By Willy Susilo
Cover of Information Security and Privacy by willy susilo

Information Security and Privacy

By Willy Susilo

View Multivariate public key cryptosystems By Jintai Ding,Jason E. Gower,Dieter Schmidt
Cover of Multivariate public key cryptosystems by jintai ding,jason e. gower,dieter schmidt

Multivariate public key cryptosystems

By Jintai Ding,Jason E. Gower,Dieter Schmidt

View Privacy and Identity Management for Life By Jan Camenisch
Cover of Privacy and Identity Management for Life by jan camenisch

Privacy and Identity Management for Life

By Jan Camenisch

View Unauthorized Access By Robert Sloan

Unauthorized Access

Unauthorized Access

By Robert Sloan

View Advances in Cryptology - CRYPTO 2013 By Ran Canetti,Juan A. Garay

Advances in Cryptology - CRYPTO 2013

Advances in Cryptology - CRYPTO 2013

By Ran Canetti,Juan A. Garay