Search

Your search keyword '"Perri, A."' showing total 33,934 results

Search Constraints

Start Over You searched for: Author "Perri, A." Remove constraint Author: "Perri, A."
33,934 results on '"Perri, A."'

Search Results

51. Insider Threat Defense

52. Index Calculus Method

54. Hippocratic Database

55. Hash Functions

56. Hardware Security Module

57. Handwriting Analysis

58. Group Signatures

59. Group Key Agreement

62. Galois Counter Mode

63. FPGAs in Cryptography

65. Firewalls

66. FIPS 140-2

67. Firewall

68. Fingerprinting

69. Exhaustive Key Search

70. Euclidean Algorithm

71. Entropy Sources

72. Enigma

73. EMV

74. Electromagnetic Attack

75. Edwards Curves

76. Cyclic Codes

77. DNA

79. Digital Steganography

80. Differential Privacy

83. Cryptanalysis

86. Decoding Algorithms

87. Copy Protection

89. Data Mining (Privacy in)

90. Data Linkage

91. Data Encryption Standard (DES)

93. Computational Complexity

94. Common Criteria

95. CBC-MAC and Variants

98. Trusted Computing

99. Traffic Analysis

100. Traitor Tracing

Catalog

Books, media, physical & digital resources