Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Cipher"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"384 - Communications; telecommunication"
Search alternatives
:
cipher »
ciphers
Showing
1
-
7
of
7
Search:
'"Cipher"'
,
query time: 0.03s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Communication System Security
by
Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents:
“
...-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream
Ciphers
; Design...
”
Call Number:
TK5105.59
Read Now
2
CWSP : certified wireless security professional official study guide
by
Coleman, David D.
Published 2010
Wiley Pub.
Table of Contents:
“
... Security; Chapter 3: Encryption
Ciphers
and Methods; Chapter 4: Enterprise 802.11 Layer 2 Authentication...
”
Call Number:
TK5103.2
Read Now
3
Applied cryptography : protocols, algorithms, and source code in C
by
Schneier, Bruce
Published 1996
Wiley
“
... and South Africa, and the RC4 stream
cipher
The latest protocols for digital signatures, authentication...
”
Call Number:
QA76.9.A25
Read Now
4
Elements of quantum computation and quantum communication
by
Pathak, Anirban
Published 2013
CRC Press
Table of Contents:
“
... Cryptography; Jargon related to cryptography; Some interesting classical
ciphers
; Different aspects of quantum...
”
Call Number:
QA76.889
Read Now
5
LTE Security
by
Horn, G?nther
Published 2010
John Wiley & Sons
Table of Contents:
“
... Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2
Ciphering
Mechanism -- 4.2.3 Integrity...
”
Call Number:
TK5103.48325
Read Now
6
5G NR : architecture, technology, implementation, and operation of 3GPP New Radio standards
by
Ahmadi, Sassan
Published 2019
Academic Press, an imprint of Elsevier
Table of Contents:
“
... -- 2.2.3.2 Header Compression Function -- 2.2.3.3
Ciphering
and Integrity Protection Functions -- 2.2.4...
”
Call Number:
TK5103.2
Read Now
7
Radio protocols for LTE and LTE-advanced
by
Yi, SeungJune
Published 2012
John Wiley & Sons Singapore
Call Number:
TK5103.48325
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
384 - Communications; telecommunication
005 - Computer programming, programs & data
3
620 - Engineering & allied operations
3
621 - Applied physics
3
004 - Data processing & computer science
1
331 - Labor economics
1
more ...
338 - Production
1
374 - Adult education
1
500 - Natural sciences & mathematics
1
510 - Mathematics
1
658 - General management
1
see all ...
less ...
Language
English
6
Undetermined
1
Collection
O'Reilly
7
Author
Ahmadi, Sassan
1
Coleman, David D.
1
Forsberg, Dan
1
Gong, Lidong Chen. Guang
1
Horn, G?nther
1
Moeller, Wolf-Dietrich
1
more ...
Niemi, Valtteri
1
Pathak, Anirban
1
Schneier, Bruce
1
Yi, SeungJune
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=%22Cipher%22&type=AllFields
Send by Email
×
Loading...