Search Results for - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures. - Cryptography.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?
2024-05-30T17:26:35Z
Group theoretic cryptography
ent://SD_ILS/0/SD_ILS:2306763
2024-05-30T17:26:35Z
2024-05-30T17:26:35Z
by González Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format: Electronic Resources<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:2295951
2024-05-30T17:26:35Z
2024-05-30T17:26:35Z
by ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>
Disappearing cryptography : information hiding, steganography & watermarking
ent://SD_ILS/0/SD_ILS:2287580
2024-05-30T17:26:35Z
2024-05-30T17:26:35Z
by Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format: Electronic Resources<br/>
Disappearing cryptography : information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:2280752
2024-05-30T17:26:35Z
2024-05-30T17:26:35Z
by Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9781558607699/?ar">https://learning.oreilly.com/library/view/~/9781558607699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar">https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar</a><br/>Format: Electronic Resources<br/>
The Modelling and Analysis of Security Protocols: the CSP Approach
ent://SD_ILS/0/SD_ILS:2326682
2024-05-30T17:26:35Z
2024-05-30T17:26:35Z
by Ryan, P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201674718/?ar">https://go.oreilly.com/library-access/library/view/-/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718/?ar">https://learning.oreilly.com/library/view/~/0201674718/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201674718">https://learning.oreilly.com/library/view/~/0201674718</a><br/>Format: Electronic Resources<br/>