Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Practical cryptography.   

Smart Card. Research and Applications: Third International Conference ...

Jean-Jacques Quisquater, Bruce Schneier - Computers - 2006 - 379 pages
Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS ...
Limited preview - About this book

The twofish encryption algorithm: a 128-bit block cipher

Bruce Schneier - Computers - 1999 - 186 pages
The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length ...
Snippet view - About this book

Schneier on Security

Bruce Schneier - Computers - 2009 - 336 pages
Limited preview - About this book

Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Bruce Schneier - Social Science - 2012 - 384 pages
In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility ...
Limited preview - About this book

Economics of Information Security and Privacy III

Bruce Schneier - Computers - 2012 - 283 pages
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields ...
Limited preview - About this book

E-mail Security: How to Keep Your Electronic Messages Private

Bruce Schneier - Computers - 1995 - 365 pages
A non-technical approach to the issue of privacy in E-Mail rates the security of popular programs and offers practical solutions--two leading-edge encryption programs, PEM ...
Snippet view - About this book

The electronic privacy papers: documents on the battle for privacy in the ...

Bruce Schneier, David Banisar - Computers - 1997 - 747 pages
A collection of classic and previously secret government and industry documents detail initiatives and strategies in the area of communications privacy for both individuals and ...
Snippet view - About this book

  1. My library
  2. Help
  3. Advanced Book Search