Your search returned 35 results.

|
1.
Handbook of research on modern cryptographic solutions for computer and cyber security / Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.

by Gupta, Brij, 1982- [editor.] | Agrawal, Dharma P. (Dharma Prakash), 1945- [editor.] | Yamaguchi, Shingo, 1969- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H364 2016.
2.
Introduction to Cryptography with Open-Source Software.

by McAndrew, Alasdair.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Baton Rouge : CRC Press, 2016Copyright date: ©2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M398 2015.
3.
Security of Block Ciphers : From Algorithm Design to Hardware Implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 S256 2015.
4.
Security of Block Ciphers : From Algorithm Design to Hardware Implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .S255 2015eb.
5.
Handbook of research on emerging developments in data privacy / Manish Gupta, editor.

by Gupta, Manish, 1978- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .H37 2015.
6.
Bent Functions : Results and Applications to Cryptography

by Tokareva, Natalia.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
7.
Application security in the ISO27001 environment / Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan.

by Vinod, Vasudevan [author.] | Mangla, Anoopt [author.] | Ummer, Firosh [author.] | Shetty, Sachin [author.] | Pakala, Sangita [author.] | Anbalahan, Siddharth [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
8.
Autonomic Computing Enabled Cooperative Networked Design.

by Wodczak, Michal.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
9.
Trustworthy Reconfigurable Systems : Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

by Feller, Thomas.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
10.
A cryptography primer : secrets and promises / Philip N. Klein, Brown University, Providence, Rhode Island.

by Klein, Philip N [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY, USA : Cambridge University Press, 2014Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: QA76.9.A25 K557 2014.
11.
Trust Management VIII : 8th IFIP WG 11. 11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings.

by Zhou, Jianying | Gal-Oz, Nurit | Zhang, Jie | Gudes, Ehud.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .T787 2014.
12.
Advances in Cryptology â€" EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.

by Nguyen, Phong Q | Oswald, Elisabeth.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .A383 2014.
13.
Selected Areas in Cryptography -- SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers.

by Lange, Tanja | Lauter, Kristin | Lisonk, Petr.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .S454 2014.
14.
Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers.

by Danger, Jean Luc | Debbabi, Mourad | Marion, Jean-Yves | Garcia-Alfaro, Joaquin | Zincir Heywood, Nur.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, z.Hd. Alexander Grossmann, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .F686 2014.
15.
Topics in Cryptology - CT-RSA 2014 : The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings.

by Hutchison, David | Kanade, Takeo | Kittler, Josef.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, z.Hd. Alexander Grossmann, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C797 2014.
16.
Simple steps to data encryption : a practical guide to secure computing / Peter Loshin.

by Loshin, Peter.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science, 2013Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
17.
Theory and practice of cryptography solutions for secure information systems / Atilla Elçi ... [et al.], editors.

by Elçi, Atilla | IGI Global.

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 T4725 2013.
18.
Cryptographic Protocol : Security Analysis Based on Trusted Freshness

by Dong, Ling | Chen, Kefei.

Material type: Text Text; Format: electronic available online remote Publisher: Berlin : Springer Berlin Heidelberg, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 | QA76.9.C643.
19.
Anonymous security systems and applications : requirements and solutions / by Shinsuke Tamura.

by Tamura, Shinsuke | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 T345 2012.
20.
Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low.

by Stamp, Mark | Low, Richard M, 1967-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley-Interscience, c2007Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: QA76.9 .A25 S687 2007 .