Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Choose an application
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.
Coding theory --- mathématiques --- carte de paiement --- cryptographie --- sécurité informatique
Choose an application
511.6 --- Algebraic number theory --- #WWIS:didaktiek --- Number theory --- Algebraic number fields --- 511.6 Algebraic number fields
Choose an application
Coding theory --- Public key cryptography --- 519.72 --- 681.3*D46 --- 681.3*E3 --- public key cryptography --- informatica --- 510 --- 520.72 --- computerbeveiliging --- codering --- 681.3*E3 Data encryption: data encryption standard DES public key cryptosystems --- Data encryption: data encryption standard DES public key cryptosystems --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 519.72 Information theory: mathematical aspects --- Information theory: mathematical aspects --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- wiskunde --- computerbeveiliging, bescherming persoonsgegevens, computerfraude --- Coding theory. --- Public key cryptography. --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 12 | << page >> |
Sort by
|