Showing
31 - 38
results of
38
for search '
"Cryptographers"
'
Skip to content
UPFind
Book Bag:
0
items
(Full)
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Search Results - "Cryptographers"
Showing
31 - 38
results of
38
for search '
"Cryptographers"
'
, query time: 0.01s
Refine Results
Sort
Relevance
Newest to Oldest
Oldest to Newest
Author
Title
Select Page
Email
Export
Print
Add to Book Bag
Select result number 31
31
Making unbreakable code.
by
Mullins, J.
Published in
IEEE spectrum
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 32
32
xCP peer-to-peer content protection.
by
Pestoni, F.
Published in
IEEE Signal processing magazine
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 33
33
Electrical engineering's identity crisis - when does a vast and vital profession become unrecognizably diffuse?.
by
Wallich, P.
Published in
IEEE spectrum
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 34
34
Commercializing Quantum Keys.
by
Moore, S.K
Published in
IEEE spectrum
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 35
35
MEMS-Assisted Cryptography for CPI Protection.
by
English, J.
Published in
IEEE Security and privacy : building confidence in a networked world
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 36
36
Security based on network topology against the wiretapping attack.
by
Jain, K.
Published in
IEEE Wireless communications
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 37
37
A note on the fragility of the "Michael" message integrity code.
by
Wool, A.
Published in
IEEE Transactions on wireless communications
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select result number 38
38
Crypto services and data security in Windows Azure.
by
Wiggs, Jonathan
Published in
MSDN magazine
Call Number:
loading...
Located:
loading...
Article
loading...
Add to Book Bag
Remove from Book Bag
Select Page
Email
Export
Print
Add to Book Bag
[1]
Prev
1
2
3
4
Search Tools:
Email Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
CAMPUS
Diliman
12 results
12
Tacloban
4 results
4
Visayas
2 results
2
Baguio
1 results
1
Manila
1 results
1
Mindanao
1 results
1
DATABASE
Union Catalog (Buklod)
38 results
38
UNIT LIBRARY
College of Arts and Letters
4 results
4
UP Tacloban Library
4 results
4
School of Library and Information Studies
3 results
3
Center for Women's Studies
2 results
2
College of Education
2 results
2
College of Engineering Library II
2 results
2
Diliman Main Library: University Archives
2 results
2
College of Humanities and Social Sciences
1 results
1
Florentino B. Herrera, Jr. Medical Library (College of Medicine)
1 results
1
National Institute for Science & Mathematics Education Development
1 results
1
UP Baguio Main Library
1 results
1
UPV Iloilo High School Library - Iloilo City
1 results
1
UPV Main Library - Miagao
1 results
1
see all…
YEAR OF PUBLICATION
From:
To:
CLASSIFICATION
P - Language and Literature
15 results
15
L - Education
2 results
2
F - General American History
1 results
1
SUBJECT
Cryptographers
18 results
18
Grail
7 results
7
Appreciation
4 results
4
Art museum curators
4 results
4
Crimes against
4 results
4
Manuscripts
4 results
4
Secret societies
4 results
4
Computer security
3 results
3
Cryptography
3 results
3
Intelligence officers
3 results
3
Mystery and detective stories
3 results
3
Fiction
2 results
2
Freemasonry
2 results
2
Access control
1 results
1
Computer Security--Fiction
1 results
1
Cryptographers--Fiction
1 results
1
Electronic voting
1 results
1
Intelligence Officer--Fiction
1 results
1
Langdon, Robert (Fictitious character)
1 results
1
Large type books
1 results
1
Leonardo, da Vinci
1 results
1
Leonardo, da Vinci, 1452-1519
1 results
1
Leonardo, da Vinci, 1452-1519--Manuscripts--Fiction
1 results
1
Mystery
1 results
1
Revocation
1 results
1
Windows Azure
1 results
1
see all…
AUTHOR
Brown, Dan 1964-
15 results
15
Mullins, J.
3 results
3
Brown, Dan
2 results
2
Borella, M.S
1 results
1
Brown, Dan, 1964-
1 results
1
Brown, Danielle 1964-
1 results
1
Cook, P.G
1 results
1
Daihyun Lim
1 results
1
De Clercq, J.
1 results
1
English, J.
1 results
1
Figueroa, Kathleen Gay Martinez
1 results
1
Gupta, V.
1 results
1
Jain, K.
1 results
1
Kim, Y.
1 results
1
Lidong Zhou
1 results
1
Moore, S.K
1 results
1
Pestoni, F.
1 results
1
Wallich, P.
1 results
1
Wiggs, Jonathan
1 results
1
Wool, A.
1 results
1
Wuysang, Danny Francis
1 results
1
see all…
RESOURCE TYPE
Book
19 results
19
Article
17 results
17
Thesis
2 results
2
LANGUAGE
English
38 results
38
TUKLAS
: UP Libraries' Resource Discovery Tool
Copyright © 2020-2021. The University Library, University of the Philippines Diliman