Ngā hua rapu - "Data encryption (Computer science)."
-
1
-
2
-
3
Cryptology transmitted message protection from deterministic chaos up to optical vortices
I whakaputaina 2016Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
4
Timing channels in cryptography a micro-architectural perspective
I whakaputaina 2015Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
5
Why cryptography should not rely on physical attack complexity
I whakaputaina 2015Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
6
The code book the science of secrecy from ancient Egypt to quantum cryptography
I whakaputaina 2000Pukapuka -
7
-
8
Modern cryptanalysis techniques for advanced code breaking
I whakaputaina 2008Table of contents only
Pukapuka -
9
Performance benchmarking of new software stream ciphers for secure multimedia streaming in resource-constrained devices
I whakaputaina 2010Tuhinga whakapae -
10