Gesuggereerde onderwerpen binnen jouw zoekopdracht.
Gesuggereerde onderwerpen binnen jouw zoekopdracht.
Cryptography
181
Computer security
65
Data encryption (Computer science)
54
Coding theory
52
Cryptography-- Computer security-- Computer science
42
Security measures
28
Mathematics
27
Computer science
23
Computer networks
19
Number theory
17
Telecommunication
10
COMPUTERS / Security / Cryptography
9
Network security
9
Ciphers
8
Internet
7
Public key cryptography
7
cryptography
7
Curves, Elliptic
6
Data processing
6
Data security
6
Number theory-- Algebra-- Mathematics
6
MATHEMATICS / Number Theory
5
Algorithms
4
Computer algorithms
4
History
4
Cryptography-Mathematics
3
Data encryption(Computer Science)
3
Data protection
3
Geometry, Algebraic
3
MATHEMATICS / Combinatorics
3
-
1
-
2
-
3
-
4
-
5
-
6door Goldreich, OdedOnderwerpen: “...Cryptography-Mathematics. 34002...”
Gepubliceerd in 2001
Printed Book -
7door Schneier, BruceOnderwerpen: “...Cryptography. 38467...”
Gepubliceerd in 2006
Volledige tekst
Volledige tekst
Volledige tekst
Printed Book -
8
-
9
-
10
-
11
-
12door Schneier, BruceOnderwerpen: “...Cryptography....”
Gepubliceerd in 1996
Table of Contents
Contributor biographical information
Publisher description
Printed Book -
13
-
14door Trappe, WadeOnderwerpen: “...Cryptography 77451...”
Gepubliceerd in 2006
Volledige tekst
Printed Book -
15Onderwerpen: “...Cryptography....”
Publisher description
Table of contents
Contributor biographical information
Printed Book -
16door Buchmann, JohannesOnderwerpen: “...Cryptography....”
Gepubliceerd in 2004
Contributor biographical information
Publisher description
Table of contents only
Printed Book -
17door Stanoyevitch, AlexanderOnderwerpen: “...Coding theory Cryptography - Mathematics Cryptography - Data processing Data encryption(computer...”
Gepubliceerd in 2011
Printed Book -
18
-
19door Mollin, Richard A.Onderwerpen: “...Cryptography Coding theory...”
Gepubliceerd in 2007
Printed Book -
20door Smith, Richard E.Onderwerpen: “...Cryptography-Computer Data encryption Network security Computer science...”
Gepubliceerd in 2007
Printed Book