-
1
Recommendation for pair-wise key establishment schemes using integer factorization cryptography /
Subjects: “…Public key infrastructure (Computer security)…”
Get full text
Government Document Online Book -
2
Recommendation for pair-wise key establishment schemes using integer factorization cryptography
Subjects: “…Public key infrastructure (Computer security)…”
Get full text
Government Document Online Book -
3
Information security : 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, proceedings /
Subjects: “…Computer security Congresses.…”
Get full text
Online Conference Proceeding Book -
4
-
5
Desktop witness : the do's and don'ts of personal computer security /
Subjects: “…Computer security.…”
Book -
6
Simple steps to data encryption a practical guide to secure computing /
Subjects: Get full text
Online Book -
7
-
8
Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine /
Subjects: “…Computer security.…”
Get full text
Online Book -
9
-
10
General procedures for registering computer security objects
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology ; For sale by the National Technical Information Service, 1993Subjects: “…Computer security.…”
Get full text
Government Document Online Book -
11
The design of Rijndael : AES--the advanced encryption standard /
Subjects: “…Computer security Passwords.…”
Book -
12
Modern cryptanalysis techniques for advanced code breaking /
Subjects: “…Computer security.…”
Get full text
Online Book -
13
Third-round report of the SHA-3 cryptographic hash algorithm competition /
Subjects: “…Computer security.…”
Get full text
Government Document Online Book -
14
The twofish encryption algorithm : a 128-bit block cipher /
Subjects: “…Computer security Passwords.…”
Book -
15
Cryptographic algorithms and key sizes for personal identity verification
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005Subjects: “…Computer security Standards.…”
Get full text
Government Document Online Book -
16
-
17
Simple steps to data encryption : a practical guide to secure computing /
Subjects: Get full text
Online Book -
18
-
19
-
20