Search

Your search keyword '"Dooley, John"' showing total 1,208 results

Search Constraints

Start Over You searched for: Author "Dooley, John" Remove constraint Author: "Dooley, John"
1,208 results on '"Dooley, John"'

Search Results

1. Auction-based Adaptive Resource Allocation Optimization in Dense IoT Networks

2. Testing Link Fidelity in a Quantum Network using Operational Form of Trace Distance with Error Bounds

3. The Interwar Period: 1919–1941

4. Battle Against the Machines: World War II 1939–1945

5. Cryptology Before 1500—A Bit of Magic

6. Crypto Goes to War: The American Civil War 1861–1865

7. The Rise of the Machines: 1918–1941

8. Crypto Goes to War: The American Revolution

9. Crypto and the War to End All Wars: 1914–1919

10. Cipher Mysteries

11. The Black Chambers: 1500–1776

12. Introduction—A Revolutionary Cipher

13. What Is Next in Cryptology?

14. Cryptology and the Internet of Things

15. Cyber Weapons and Cyber Warfare

16. Web and Mobile Device Cryptology

17. The Machines Take Over: Computer Cryptography

18. Alice and Bob and Whit and Martin: Public-Key Cryptography

24. Debugging

38. Studying the Adoption of 5G and Future Networks for Social Inclusion: An Innovation Systems Transitions Perspective for Networks-as-a-Service

39. Blood Money: Selling Plasma to Avoid High-Interest Loans.

41. The Cipher Bureau: Success and Decline

42. The Lone Cryptologists: Escape from Riverbank

43. The Cipher Bureau: Early Days

44. What Might Have Been

45. Wars End

46. A Pretty Young Woman in a Pink Dress

47. The Great War: Meetings

48. Beginnings: William Friedman and Elizebeth Smith

49. Memories of Friedman and Yardley

50. Beginnings: Herbert Yardley

Catalog

Books, media, physical & digital resources