Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Cryptography
- Authority link
- http://id.worldcat.org/fast/00884552
- Source
- fast
327 Items that share the Concept Cryptography
Context
Context of CryptographySubject of
No resources found
No enriched resources found
- . Net Security and Cryptography
- 13th International ISC Conference on Information Security & Cryptology : 7-8 September 2016, Faculty of Computer Science & Engineering, Shahid Beheshti University, Tehran, Iran
- 16th Canadian Workshop on Information Theory
- 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security : 16-19 October 2005, Awaji Island, Japan
- 2006 International Conference on Intelligent Information Hiding and Multimedia Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
- 2007 10th Canadian Workshop On Information Theory : Edmonton, Alberta, Canada, June 6-8, 2007
- 2009 11th Canadian Workshop on Information Theory
- 2011 12th Canadian Workshop on Information Theory
- 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings : 28 September 2011, Nara, Japan
- 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2012 : proceedings : 9 September 2012, Leuven, Belgium
- 2013 13th Canadian Workshop on Information Theory
- 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2014 : proceedings : 23 September 2014, Busan, Korea
- 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)
- 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2015 : proceedings : 13 September 2014, Saint Malo, France
- 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2016 : proceedings : Santa Barbara, California, USA, 16 August 2016
- 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : September 6-7, 2017, Shiraz University, Shiraz, Iran
- 2017 15th Canadian Workshop on Information Theory (CWIT)
- 2017 Second Al-Sadiq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)
- 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : August 28-29, 2018, Shahid Rajaee Teacher Training University - Tehran, Iran
- 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2019 : proceedings : Atlanta, United States, 24 August 2019
- 2020 Workshop on Fault Detection and Tolerance in Cryptography : FDTC 2020 : proceedings : virtual conference, 13 September 2020
- 53rd Annual Allerton Conference on Communication, Control, and Computing : September 29 - October 2, 2015
- A brief history of cryptology and cryptographic algorithms
- A classical introduction to cryptography : applications for communications security
- A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
- Advanced statistical steganalysis
- Advances in Cryptology " ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3 7, 2000 Proceedings
- Advances in Cryptology " CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19 23, 2001 Proceedings
- Advances in Cryptology " CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18 22, 2002 Proceedings
- Advances in Cryptology, CRYPTO 2008 : 28th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2008 : proceedings
- Advances in cryptology - CRYPTO 2006 : 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006 : proceedings
- Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
- Advances in cryptology - EUROCRYPT 2009 : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
- Advances in cryptology -- EUROCRYPT 2005 : 24th annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005 : proceedings
- Advances in cryptology -- EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings
- Advances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings
- Advances in cryptology : ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005 : proceedings
- Advances in cryptology : CRYPTO '89, proceedings
- Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings
- Advances in cryptology : CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part I
- Advances in cryptology : CRYPTO 2013 : 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part II
- Advances in cryptology : Conference on the theory and applications of cryptographic techniques : Papers
- Advances in cryptology : EUROCRYPT '99 : International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 ; proceedings
- Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings
- Advances in cryptology : EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006 : proceedings
- Advances in cryptology : EUROPCRYPT '88 : Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings
- Advances in cryptology : proceedings of CRYPTO 84
- Advances in cryptology : proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984
- Advances in cryptology : proceedings, CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009
- Advances in cryptology, 1981-1997 : electronic proceedings and index of the CRYPTO and EUROCRYPT conferences, 1981-1997
- Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
- Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings
- Advances in cryptology, CRYPTO '95 : 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995 : proceedings
- Advances in cryptology, CRYPTO '96 : 16th annual international cryptology conference, Santa Barbara, California, USA, August 18-22, 1996 : proceedings
- Advances in cryptology, CRYPTO '98 : 18th Annual International Conference, Santa Barbara, California, USA, August 23-27, 1998 : proceedings
- Advances in cryptology-- ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006 ; proceedings
- Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
- Advances in cryptology-- CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings
- Advances in cryptology--ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings
- Advances in cryptology--ASIACRYPT'98 : International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998 : proceedings
- Advances in cryptology--ASiACRYPT 2012 : 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings
- Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings
- Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings
- Advances in cryptology--CRYPTO '85 : proceedings
- Advances in cryptology--CRYPTO '86 : proceedings
- Advances in cryptology--CRYPTO '88 : proceedings
- Advances in cryptology--CRYPTO '90 : proceedings
- Advances in cryptology--CRYPTO '91 : proceedings
- Advances in cryptology--CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA August 15-19, 1999 proceedings
- Advances in cryptology--CRYPTO 2010 : 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings
- Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings
- Advances in cryptology--EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings
- Advances in cryptology--EUROCRYPT 2011 : 30th annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings
- Advances in cryptology-ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 2002 : proceedings
- Advances in cryptology-ASIACRYPT 2003 : 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4, 2003 : proceedings
- Advances in cryptology-CRYPTO 2000 : 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000 : proceedings
- Al-Sadeq International Conference on Multidisciplinary in IT and Communication Techniques Science and Applications (AIC-MITCSA 2016) : hold at "Imam Jaafar Al-Sadiq" University, Baghdad, Iraq, in (9-10) May 2016
- Algebraic cryptanalysis
- Algorithmic arithmetic, geometry, and coding theory : 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France
- Algorithmic problems of group theory, their complexity, and applications to cryptography
- American cryptology : two centuries of tradition
- American signal intelligence in Northwest Africa and Western Europe
- Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings
- Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings
- Applied cryptography and network security : 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
- Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings
- Applied cryptography and network security : first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
- Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
- Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
- Arithmetic geometry : computation and applications : 16th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 19-23, 2017, Centre International de Rencontres Mathématiques, Marseille, France
- Arithmetic, geometry, cryptography and coding theory : 15th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory, May 18-22, 2015, CIRM, Luminy, France
- Arithmetic, geometry, cryptography, and coding theory : 17th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory, June 10-14, 2019, Centre International de Rencontres Mathématiques, Marseille, France
- Automated reasoning for security protocol analysis and issues in the theory of security : Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010 : revised selected papers
- Boolean functions in coding theory and cryptography
- Code breaking in the Pacific
- Code girls : the untold story of the American women code breakers of World War II
- Code talkers : hearing before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, second session, on contributions of Native American code talkers in American military history, September 22, 2004, Washington, DC
- Codes : an introduction to information communication and cryptography
- Codici Cifrati, Arne Beurling e la crittografia nella II guerra mondiale
- Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
- Coding and cryptology : second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings
- Coding for data and computer communications
- Colloquium on "Public Uses of Cryptography" : held at Savoy Place, Thursday, 11 April 1996
- Colloquium on "Security and cryptography applications to radio systems" : on Friday, 3 June 1994
- Complexity theory and cryptology : an introduction to cryptocomplexity
- Computer security and cryptography
- Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
- Concurrent zero-knowledge
- Construction and analysis of cryptographic functions
- Cracking codes & cryptograms for dummies
- Cryptanalytic attacks on RSA
- Cryptographic hardware and embedded systems : CHES 2006 : 8th international workshop, Yokohama, Japan, October 10-13, 2006 : proceedings
- Cryptographic hardware and embedded systems : CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings
- Cryptographic hardware and embedded systems-- CHES 2005 : 7th international workshop, Edinburgh, UK, August 29-September 1, 2005 : proceedings
- Cryptographic hardware and embedded systems--CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings
- Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings
- Cryptography
- Cryptography : Infosec pro guide
- Cryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings
- Cryptography and coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings
- Cryptography and coding : 12th IMA International Conference, cryptography and coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings
- Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
- Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 2003 : proceedings
- Cryptography and cryptanalysis in MATLAB : creating and programming advanced algorithms
- Cryptography and lattices : international conference, CaLC 2001, Providence RI, USA, March 29-30, 2001 : revised papers
- Cryptography and network security
- Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
- Cryptography for developers
- Cryptography in C and C++
- Cryptologia
- Cryptologic aspects of German intelligence activities in South America during World War II
- Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings
- Cryptology and network security : 5th international conference, CANS 2006 Suzhou, China, December 2006 : proceedings
- Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 ; proceedings
- Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings
- Decrypted secrets : methods and maxims of cryptology
- Digital Signature Schemes : General Framework and Fail-Stop Signatures
- Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers
- Digital signature standard (DSS)
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding, steganography & watermarking
- Dynamic secrets in communication security
- Eavesdropping on hell : historical guide to Western communications intelligence and the Holocaust, 1939-1945
- Efficient secure two-party protocols : techniques and constructions
- Elementary number Theory, cryptography and codes
- Encyclopedia of cryptography and security
- Export controls on mass market software : hearing before the Subcommittee on Economic Policy, Trade, and Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Third Congress, first session, October 12, 1993
- FDTC 2009 : 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings, 6 September 2009, Lausanne, Switzerland
- FDTC 2013 : 10th Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings : 20 August 2013, Santa Barbara, California
- FDTC 2017 : 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings : Taipei, Taiwan, 25 September 2017
- FDTC 2018 : 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography : proceedings : Amsterdam, Netherlands, 13 September 2018
- Fault diagnosis and tolerance in cryptography : third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006 ; proceedings
- Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
- Finite automata and application to cryptography
- Finite fields and applications : 7th International Conference, Fq7 Toulouse, France, May 5-9, 2003 : revised papers
- Formal aspects in security and trust : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers
- Foundations and applications of security analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers
- Group-based cryptography
- Gröbner bases, coding, and cryptography
- Hands-on cryptography with Java
- Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt data
- Hashing in computer science : fifty years of slicing and dicing
- Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
- How I discovered World War II's greatest spy : and other stories of intelligence and code
- How I discovered World War II's greatest spy : and other stories of intelligence and code
- IBM eserver zSeries 990 (z990) cryptography implementation
- IEEE International Carnahan Conference on Security Technology
- IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China
- IIH-MSP 2009 : 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 12-14 September 2009, Kyoto, Japan
- IIH-MSP 2010 : 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings, Darmstadt, Germany, 15-17 October 2010
- IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan
- ISCTURKEY 2020 : 2020 International Conference on Information Security and Cryptology : 3-4 December 2020, Middle East Technical University, Ankara, Turkey
- Information Forensics and Security (WIFS), 2010 IEEE International Workshop on : date, 12-15 Dec. 2010
- Information Forensics and Security (WIFS), 2011 IEEE International Workshop on : date, Nov. 29 2011-Dec. 2 2011
- Information hiding : 11th international workshop ; revised selected papers, IH 2009, Darmstadt, Germany, June 8-10, 2009
- Information security and cryptology - ICISC 2006 : 9th international conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings
- Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 ; proceedings
- Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers
- Information security and cryptology : 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009 : revised selected papers
- Information security and cryptology : 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers
- Information security and cryptology : 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers
- Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings
- Information security and cryptology : ICISC 2005, 8th international conference, Seoul, Korea, December 1-2, 2005 : revised selected papers
- Information security and cryptology : first SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005 : proceedings
- Information security and cryptology : second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings
- Information security and cryptology : third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007 : revised selected papers
- Information security and cryptology--ICISC 2001 : 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings
- Information security and cryptology--ICISC 2002 : 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers
- Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers
- Information security and cryptology--ICISC'99 : second international conference, Seoul, Korea, December 9-10, 1999 : proceedings
- Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers
- Information theoretic security : 5th international conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers
- Information theory : coding and cryptography
- Information theory and applications II : 4th Canadian workshop, Lac Delage, Québec, Canada, May 28-30, 1995 : selected papers
- Introduction to cryptography with Maple
- Introduction to modern cryptography
- Java cryptography
- Journal of cryptology : the journal of the International Association for Cryptologic Research
- Kryptografie : verfahren, protokolle, infrastrukturen
- Lectures on data security : modern cryptology in theory and practice
- Malicious cryptography : exposing cryptovirology
- Masked dispatches : cryptograms and cryptology in American history, 1775-1900
- Military cryptanalysis
- Modern cryptanalysis : techniques for advanced code breaking
- Modern cryptology : a tutorial
- Navajo weapon : the Navajo code talkers
- Near and distant neighbors : a new history of Soviet intelligence
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- Number theory and applications : proceedings of the International Conferences on Number Theory and Cryptography
- Pairing-based cryptography - Pairing 2009 : Third International Conference, Palo Alto, CA, USA, August 12-14, 2009 : proceedings
- Pairing-based cryptography-- : Pairing 2007 : first international conference, Tokyo, Japan, July 2-4, 2007 : proceedings
- Pairing-based cryptography--Pairing 2010 : 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings
- Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
- Post-quantum cryptography
- Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings
- Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings
- Practical cryptography in Python : learning correct cryptography by example
- Practical signcryption
- Primality testing and integer factorization in public-key cryptography
- Privacy enhancing technologies : 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011 : proceedings
- Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers
- Privacy enhancing technologies : 8th international symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008 : proceedings
- Privacy enhancing technologies : 9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings
- Proceedings : the Institute of Electrical and Electronics Engineers : 1988 International Carnahan Conference on Security Technology : crime countermeasures, October 5-7, 1988
- Proceedings of 17th International ISC Conference on Information Security and Cryptology (ISCISC'2020) : 9-10 September 2020, Iran University of Science and Technology
- Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security : December 6-9, 2009, London, UK
- Proceedings, FDTC 2008 : fault diagnosis and tolerance in cryptography : 10 August 2008, Washington, DC, USA
- Proceedings, FDTC 2010, Fault Diagnosis and Tolerance in Cryptography : Santa Barbara, California, 21 August 2010
- Progress in Cryptology - INDOCRYPT 2006 : 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006 ; proceedings
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Progress in cryptology - INDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings
- Progress in cryptology : INDOCRYPT 2000 : First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000 : proceedings
- Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings
- Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings
- Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings
- Progress in cryptology : INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005 : proceedings
- Progress in cryptology : INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007 : proceedings
- Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings
- Progress in cryptology : INDOCRYPT 2009 : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings
- Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
- Progress in cryptology : VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers
- Progress in cryptology--AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings
- Progress in cryptology--AFRICACRYPT 2009 : second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 : proceedings
- Progress in cryptology--AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings
- Progress in cryptology--INDOCRYPT 2010 : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings
- Progress in cryptology--LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings
- Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
- Provable security : 5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings
- Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
- Provable security : second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings
- Provable security : third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings
- Radio frequency identification : security and privacy Issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers
- Rare books in the National Cryptologic Museum
- Renewed crypto wars
- Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
- SOFSEM 2012 : theory and practice of computer science : 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21-27, 2012 : proceedings
- Secret warriors : the spies, scientists and code breakers of World War I
- Security Protocols : International Workshop Cambridge, United Kingdom, April 1012, 1996 Proceedings
- Security and communication networks
- Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
- Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings
- Security and cryptography for networks : 7th international conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings
- Security in communication networks : 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers
- Security in communication networks : third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002 : revised papers
- Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers
- Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
- Security protocols : 12th international workshop, Cambridge, UK, April 26-28, 2004 : revised selected papers
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 14th international workshop, Cambridge, March 27-29 2006, revised selected papers
- Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings
- Security protocols : 6th international workshop, Cambridge, UK, April 15-17, 1998 : proceedings
- Security protocols : 7th international workshop, Cambridge, UK, April 19-21, 1999 : proceedings
- Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
- Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
- Security protocols XVI : 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers
- Security protocols XXI : 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selected papers
- Selected areas in cryptography : 11th international workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers
- Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers
- Selected areas in cryptography : 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Selected areas in cryptography : 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15 : revised selected papers
- Selected areas in cryptography : 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers
- Selected areas in cryptography : 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001 : Revised papers
- Sharing the burden : women in cryptology during World War II
- Silent warriors : the Naval Security Group Reserve, 1945-2005
- So power can be brought into play : SIGINT and the Pusan Perimeter
- State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- The IEE Seminar on Quantum Cryptography: Secure Communications for Business? : Wednesday, 7 December 2005, the IEE, Savoy Place, London, UK
- The Venona story
- The block cipher companion
- The history of traffic analysis : World War I-Vietnam
- The modelling and analysis of security protocols : the CSP approach
- The origins of the National Security Agency, 1940-1952
- The threat of foreign economic espionage to U.S. corporations : hearings before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, second session, April 29 and May 7, 1992
- The woman who smashed codes : a true story of love, spies, and the unlikely heroine who outwitted America's enemies
- Theory of Cryptography : 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009 : proceedings
- Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007 : proceedings
- Theory of cryptography : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings
- Theory of cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008 : proceedings
- Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings
- Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
- Theory of cryptography : first Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004 : proceedings
- Theory of quantum computation, communication and cryptography : 4th workshop, TQC 2009, Waterloo, Canada, May 11-13 : revised selected papers
- Topics in cryptology - CT-RSA 2009 : the cryptographers' track at the RSA conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings
- Topics in cryptology - CT-RSA 2010 : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
- Topics in cryptology : CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings
- Topics in cryptology : CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007 : proceedings
- Topics in cryptology : CT-RSA 2008, the Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008 : proceedings
- Topics in cryptology, CT-RSA 2001 : the Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001 : proceedings
- Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
- Topics in cryptology, CT-RSA 2003 : the Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003 : proceedings
- Topics in cryptology-- CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings
- Topics in cryptology--CT-RSA 2005 : the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005 : proceedings
- Topics in geometry, coding theory and cryptography
- Understanding cryptography : a textbook for students and practitioners
- Versteckte Botschaften : die faszinierende Geschichte der Steganografie
- WIFS'12 : proceedings of the 2012 International Workshop on Information Forensics and Security, Tenerife, Spain, December 2-5, 2012
- WIFS'13 : Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security
- Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
- West wind clear : cryptology and the winds message controversy : a documentary history
- Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2007 : proceedings, 10 September, 2007, Vienna, Austria
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/PR1m9-8BZLM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/PR1m9-8BZLM/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cryptography
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/PR1m9-8BZLM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/PR1m9-8BZLM/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>