Hours
Libraries & Collections
Joyner Library
Laupus Health Sciences Library
Music Library
Digital Collections
Special Collections
Teaching Resources Center
The ScholarShip Institutional Repository
Country Doctor Museum
Get Help
ECU Libraries Catalog
Browse
Call Number
Title
Author
Subject
Series
Advanced Search
Course Reserves
Suggest a Purchase
My Account
Preview Version:
You're viewing our new catalog design.
Share your feedback
or
return to the current catalog
.
Find Materials By
Format
Toggle Format Facet
Electronic
372
Print
129
Book
116
Microform
8
Archival & Manuscript Material
0
More Formats
Library Location
Toggle Library Location Facet
Joyner Library
495
Laupus Library
283
Music Library
278
Publication Date
Toggle Publication Date Facet
Since 2020
22
2010-2019
197
2000-2009
194
1990-1999
78
1980-1989
2
More Publication Dates
Call Number
Toggle Call Number Facet
Q - Science
53
T - Technology
12
H - Social Science
11
Z - Library Science
2
J - Political Science
1
More Call Numbers
Collection
Toggle Collection Facet
Joyner E-Resources
358
Laupus E-Resources
283
Joyner Stacks
80
Joyner Federal Documents
56
Language
Toggle Language Facet
English
495
Genre
Toggle Genre Facet
Electronic books
276
Congresses
169
Electronic journals
7
Kongress
7
Legislative hearings
7
More Genres
Era
Toggle Era Facet
Region
Toggle Region Facet
United States
120
Malaysia
2
OECD countries
2
Calgary <2009>
1
Darmstadt <2010>
1
More Regions
Search Results
All Fields
Title
Author
Journal Title
Subject
Series
ISBN/ISSN
Publisher
Advanced
Search
Start Over
You searched for:
subject
"Data encryption (Computer science)"
Remove constraint
Showing 31 - 40 of 495 results
Sort by: Relevance;
Relevance
Year (Descending)
Year (Ascending)
Author (Ascending)
Author (Descending)
Title (Ascending)
Title (Descending)
10 per page
10 per page
20 per page
50 per page
100 per page
Search Results
Cryptographic algorithms and key sizes for personal identity verification
by
Polk, Tim, 1962-
2005
Format:
Electronic
Location
Access Content Online
Everyday cryptography
by
Martin, Keith M.
2012
Format:
Book
Joyner Library
- General Stacks
Call Number:
QA76.9 .A25 M37 2012
Cryptology
by
Buydos, John F.
1996
Format:
Electronic
Location
Access Content Online
Chaos-based cryptography
2011
Format:
Electronic
Location
Access Content Online
NIST cryptographic standards and guidelines development process (draft)
by
Information Technology Laboratory (National Institute of Standards and Technology).
2014
Format:
Electronic
Location
Access Content Online
The code book
by
Singh, Simon
1999
Format:
Book
Joyner Library
- General Stacks
Call Number:
Z103 .S56 1999
Advances in cryptology
by
EUROCRYPT '99.
1999
Format:
Book
Joyner Library
- General Stacks
Call Number:
QA76.9.A25 E964 1999
Research in cryptology
by
Western European Workshop on Research in Cryptology
2012
Format:
Electronic
Location
Access Content Online
Progress in cryptology-- LATINCRYPT 2012
by
International Conference on Cryptology and Information Security in Latin America
2012
Format:
Electronic
Location
Access Content Online
Topics in Cryptology -- CT-RSA 2011
by
Kiayias, Aggelos
2011
Format:
Electronic
Location
Access Content Online
Previous
2
3
4
5
6
Next