Your search returned 57 results.

|
1.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625.
2.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
3.
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption.

by Holden, Joshua.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Princeton : Princeton University Press, 2017Copyright date: ©2017Online access: Click here to view book Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA268 .H653 2019.
4.
Introduction to Cryptography with Open-Source Software.

by McAndrew, Alasdair.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Baton Rouge : CRC Press, 2016Copyright date: ©2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M398 2015.
5.
Bent Functions : Results and Applications to Cryptography

by Tokareva, Natalia.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
6.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'.

by Heiderich, Mario | Nava, Eduardo Alberto Vela | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625 -- .H46 2011.
7.
Cryptographic Protocol : Security Analysis Based on Trusted Freshness

by Dong, Ling | Chen, Kefei.

Material type: Text Text; Format: electronic available online remote Publisher: Berlin : Springer Berlin Heidelberg, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 | QA76.9.C643.
8.
Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low.

by Stamp, Mark | Low, Richard M, 1967-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley-Interscience, c2007Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: QA76.9 .A25 S687 2007 .
9.
Pairing-based cryptography-- : Pairing 2007 : first international conference, Tokyo, Japan, July 2-4, 2007 : proceedings / Tsuyoshi Takagi ... [et al.] (eds.).

by International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan) | Takagi, Tsuyoshi.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: Pairing 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I55447 2007.
10.
Selected areas in cryptography : 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers / Eli Biham, Amr M. Youssef (eds.).

by SAC 2006 (2006 : Montréal, Québec) | Biham, Eli | Youssef, Amr M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: SAC 2006.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S22 2006.
11.
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / Pascal Paillier, Ingrid Verbauwhede (eds.).

by CHES 2007 (2007 : Vienna, Austria) | Paillier, Pascal | Verbauwhede, Ingrid.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer-Verlag, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK7895.E42 C45433 2007.
12.
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer.

by Bauer, Friedrich Ludwig, 1924-.

Edition: 4th, rev. and extended ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 B38513 2007.
13.
Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings / Tatsuaki Okamoto, Xiaoyun Wang (eds.).

by International Workshop on Practice and Theory in Public Key Cryptography (10th : 2007 : Beijing, China) | Okamoto, Tatsuaki | Wang, Xiaoyun | International Association for Cryptologic Research.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: PKC 2007 | 10th International Workshop on Practice and Theory in Public-Key Cryptography | Tenth International Workshop on Practice and Theory in Public-Key Cryptography.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I567 2007.
14.
Introduction to cryptography : principles and applications / Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 D447 2007.
15.
Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [et al.], (eds).

by Pan, Jeng-Shyang.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I548 2007.
16.
Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007 : proceedings / Salil P. Vadhan (ed.).

by Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands) | Vadhan, Salil | International Association for Cryptologic Research.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: TCC 2007 | 4th Theory of Cryptography Conference | Fourth Theory of Cryptography Conference.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 T473 2007.
17.
Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers / Nikita Borisov, Philippe Golle (eds.).

by PET 2007 (2007 : Ottawa, Ont.) | Borisov, Nikita | Golle, Philippe.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: PET 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 P443 2007.
18.
Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings / Willy Susilo, Joseph K. Liu, Yi Mu (eds.).

by ProvSec 2007 (2007 : Wollongong, N.S.W.) | Susilo, Willy | Liu, Joseph K | Mu, Yi, 1955-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: ProvSec 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 P787 2007.
19.
Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 ; proceedings / Kil-Hyun Nam, Gwangsoo Rhee (eds.).

by ICISC 2007 (2007 : Seoul, Korea) | Won, Dongho, 1949-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I32 2007.
20.
Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings / Kaoru Kurosawa (ed.).

by International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak) | Kurosawa, Kaoru.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: ASIACRYPT 2007 | 13th International Conference on the Theory and Application of Cryptology | Thirteenth International Conference on the Theory and Application of Cryptology | International Conference on the Theory and Application of Cryptology.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I555 2007.