Refine your search

Your search returned 153 results.

|
1.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625.
2.
Cryptography Arithmetic : Algorithms and Hardware Architectures.

by Omondi, Amos R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
3.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
4.
Mathematics and Computation

by Wigderson, Avi.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Princeton : Princeton University Press, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA267.7.
5.
The Mathematical and Philosophical Works of the Right Rev. John Wilkins.

by Wilkins, John.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : Taylor & Francis Group, 2019Copyright date: ©1708Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q155 .W555 2018.
6.
Cybercryptography.

by Yan, Song Y.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
7.
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.

by Grimes, Roger A.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .G75 2020.
8.
Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation.

by Díaz Cardell, Sara | Fúster-Sabater, Amparo.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA1-939.
9.
Improving Image Quality in Visual Cryptography.

by Yan, Bin | Xiang, Yong | Hua, Guang.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore Pte. Limited, 2019Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
10.
Public-Key Cryptography - PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II.

by Lin, Dongdai | Sako, Kazue.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.5 .P835 2019.
11.
Lattice-Based Public-Key Cryptography in Hardware.

by Sinha Roy, Sujoy | Verbauwhede, Ingrid.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore Pte. Limited, 2019Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
12.
Advances in Cryptology - ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II.

by Galbraith, Steven D | Moriai, Shiho.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I58 2019.
13.
Theory of Cryptography : 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I.

by Hofheinz, Dennis | Rosen, Alon.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I58 2019.
14.
Progress in Cryptology - INDOCRYPT 2019 : 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings.

by Hao, Feng | Ruj, Sushmita | Sen Gupta, Sourav.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .P764 2019.
15.
Lai-Massey Cipher Designs : History, Design Criteria and Cryptanalysis.

by Nakahara Jr., Jorge.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
16.
Steganography Techniques for Digital Images.

by Yahya, Abid.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
17.
Advances in Cryptology - ASIACRYPT 2018 : 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III.

by Peyrin, Thomas | Galbraith, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
18.
Security solutions and applied cryptography in smart grid communications / Mohamed Amine Ferrag and Ahmed Ahmim, editors.

by Ferrag, Mohamed Amine, 1987- [editor.] | Ahmim, Ahmed, 1986- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK3105 .S43 2017.
19.
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption.

by Holden, Joshua.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Princeton : Princeton University Press, 2017Copyright date: ©2017Online access: Click here to view book Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA268 .H653 2019.
20.
Algebraic Geometry for Coding Theory and Cryptography : IPAM, Los Angeles, CA, February 2016.

by Howe, Everett W | Lauter, Kristin E | Walker, Judy L.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA1-939.