33,934 results on '"Perri, A."'
Search Results
52. Index Calculus Method
53. HTTP Digest Authentication
54. Hippocratic Database
55. Hash Functions
56. Hardware Security Module
57. Handwriting Analysis
58. Group Signatures
59. Group Key Agreement
60. Generic Attacks Against DLP
61. General Data Protection Regulation (GDPR)
62. Galois Counter Mode
63. FPGAs in Cryptography
64. Formal Methods for the Orange Book
65. Firewalls
66. FIPS 140-2
67. Firewall
68. Fingerprinting
69. Exhaustive Key Search
70. Euclidean Algorithm
71. Entropy Sources
72. Enigma
73. EMV
74. Electromagnetic Attack
75. Edwards Curves
76. Cyclic Codes
77. DNA
78. Digital Signature Schemes from Codes
79. Digital Steganography
80. Differential Privacy
81. Differential Cryptanalysis
82. CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)
83. Cryptanalysis
84. Denial-of-Service Detection
85. Decisional Diffie–Hellman Problem
86. Decoding Algorithms
87. Copy Protection
88. Content-Based and View-Based Access Control
89. Data Mining (Privacy in)
90. Data Linkage
91. Data Encryption Standard (DES)
92. Computational Diffie-Hellman Problem
93. Computational Complexity
94. Common Criteria
95. CBC-MAC and Variants
96. Wireless Device Fingerprinting
97. Web Single Sign On and SAML
98. Trusted Computing
99. Traffic Analysis
100. Traitor Tracing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.