Search

Your search keyword '"CRYPTOGRAPHY research"' showing total 318 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY research" Remove constraint Descriptor: "CRYPTOGRAPHY research"
318 results on '"CRYPTOGRAPHY research"'

Search Results

301. The Future of Architecture: Moss, Not Mirrors.

302. Space Crunchers and GOST Busters!

303. Analyzing a Family of Key Protection Schemes against Modification Attacks.

304. Teamwork Pays Off!

305. Directing Optical Traffic.

306. A Novel Identity-Based Multi-Signcryption Scheme.

307. Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic.

308. Designated-Verifier Chameleon Proxy Signature.

309. Architecture Support for Memory Confidentiality and Integrity in Embedded Systems.

310. Can You Break the NKU Monopoly?

311. How to Break Cryptography with Your Bare Hands.

312. DARPA Will Spend $20 Million To Search For Crypto's Holy Grail.

313. Student Who Examines Computing Secrecy Fears Prosecution Under New Law.

315. Washington Notes.

316. In Federal Agencies.

317. Voluntary Censorship Proposed to Solve Question of Secrecy in Computer Codes.

318. Untitled.

Catalog

Books, media, physical & digital resources