Kryptologie
Resource Information
The concept Kryptologie represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
The Resource
Kryptologie
Resource Information
The concept Kryptologie represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
- Label
- Kryptologie
- Source
- swd
76 Items that share the Concept Kryptologie
Context
Context of KryptologieSubject of
No resources found
No enriched resources found
- A course in number theory and cryptography
- Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
- Advances in cryptology--ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings
- Algebraic aspects of cryptography
- Applications of abstract algebra with Maple
- Cipher systems : the protection of communications
- Codes, ciphers, and computers : an introduction to information security
- Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
- Cryptographic hardware and embedded systems - CHES 2009 : 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings
- Cryptographic hardware and embedded systems - CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings
- Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems
- Cryptography and coding : 12th IMA International Conference, cryptography and coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings
- Cryptography and data security
- Cryptography and lattices : international conference, CaLC 2001, Providence RI, USA, March 29-30, 2001 : revised papers
- Cryptology and computational number theory
- Decrypted secrets : methods and maxims of cryptology
- Disappearing cryptography : being and nothingness on the Net
- Distributed computing and internet technology : 7th international conference, ICDCIT 2011, Bhubaneshwar, India, February 9-12, 2011 : proceedings
- Elliptic curves : number theory and cryptography
- Error control, cryptology, and speech compression : Workshop on Information Protection, Moscow, Russia, December 6-9, 1993 : selected papers
- Fast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers
- Financial cryptography : 4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000 : proceedings
- Financial cryptography : 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings
- Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings
- Financial cryptography : Third International Conference, FC '99, Anguilla, British West Indies, February 22-25, 1999 : proceedings
- Financial cryptography : second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings
- Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
- Financial cryptography and data security : 12th international conference, FC 2008, Cozumel, Mexico, January 28-31, 2008 ; revised selected papers
- Foundations of security analysis and design : tutorial lectures
- Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures
- Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings
- Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
- Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings
- Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings
- Information security : first international workshop, ISW '97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997 : proceedings
- Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
- Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 : revised selected papers
- Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings
- Information security and cryptology : ICISC 2008, 11th international conference, Seoul, Korea, December 3-5, 2008 : revised selected papers
- Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
- Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings
- Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings
- Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 : proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers
- Infrastructure security : international conference, InfraSec 2002, Bristol, UK, October 1-3, 2002 : proceedings
- Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE RACE (1040)
- Lectures on data security : modern cryptology in theory and practice
- Mobile agents and security
- Modern cryptology : a tutorial
- Network security : private communication in a public world
- Practical cryptography for data internetworks
- Primality and cryptography
- Progress in cryptology : INDOCRYPT 2000 : First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000 : proceedings
- Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings
- Progress in cryptology : INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007 : proceedings
- Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings
- Public key cryptography : first International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings
- Research in cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers
- Secure Internet programming : security issues for mobile and distributed objects
- Secure communications and asymmetric cryptosystems
- Secure speech communications
- Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings
- Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings
- Security protocols : 6th international workshop, Cambridge, UK, April 15-17, 1998 : proceedings
- Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Selected areas in cryptography : 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001 : revised papers
- Selected areas in cryptograpy : 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000 : proceedings
- Sequences II : methods in communication, security and computer science
- Stabilization, safety, and security of distributed systems : 12th international symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, proceedings
- State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
- The code book : the evolution of secrecy from Mary, Queen of Scots, to quantum cryptography
- The cryptographic imagination : secret writing from Edgar Poe to the Internet
- Topics in cryptology : CT-RSA 2008, the Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008 : proceedings
- Topics in cryptology, CT-RSA 2009 : the cryptographers' track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 : proceedings
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/DsJt5jJpxr0/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/DsJt5jJpxr0/">Kryptologie</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Kryptologie
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/DsJt5jJpxr0/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/DsJt5jJpxr0/">Kryptologie</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>