A Bibliography of Publications on Cryptography: 1606–1989

نویسنده

  • Nelson H. F. Beebe
چکیده

10 [Hel81, Mei81]. 1004 [Mil87b]. 1040 [Lin88]. 11 [Muf88]. 1113 [Lin89]. 112 [Nat85a]. 113 [Nat85b]. 12 [Bv82]. 121 [Hun85, Wic87]. 1413 [Joh93]. 1421 [Lin93]. 1500-1815 [TP63]. 15th [IEE74]. 18 [Riv79]. 1917 [FM76]. 1939-1945 [Jon78]. 1941 [MB86]. 1942 [Uni79b]. 1944 [ML87]. 1945 [Uni79b]. 1976 [BGK77]. 1977 [Uni78a]. 1981 [BBB81]. 1982 [IEE82b]. 1983 [Bur81, Fêa83, Had84]. 1984} [San86, BCI85]. 1986 [ACM86, IEE86a].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Bibliography of Publications on Cryptography: 2000–2009

html; http: //www.elsevier.nl/gejng/10/41/16/186/20/29/ article.pdf.

متن کامل

ULRIKE JORDAN RESEARCH ON BRITISH HISTORY IN THE FEDERAL REPUBLIC OF GERMANY 1989-1994 An Annotated Bibliography GERMAN HISTORICAL INSTITUTE LONDON

This annotated bibliography of German research on British history, the third published by the German Historical Institute London, demonstrates that German historians' interest in this subject is undiminished. In presenting this aid to research, the Institute assumes an equal interest on the part of English-speaking historians in the work of their Ger-man colleagues. The aim is to initiate and t...

متن کامل

Guidelines (1988) for training in clinical laboratory management

Trainees in laboratory medicine must develop skills in laboratory management. Guidelines are detailed for laboratory staff in training, directors responsible for staff development and professional bodies wishing to generate material appropriate to their needs. The syllabus delineates the knowledge base required and includes laboratory planning and organisation, control of operations, methodolog...

متن کامل

A Complete Bibliography of Publications in the Journal of Cryptology

abelian [326, 408, 91, 337]. Abstract [117]. Accelerated [512]. Accelerating [398]. Achieve [477]. Acoustic [525]. Adaptive [241, 390, 471]. Adaptively [523, 390]. Adic [130]. Advance [279]. Adversarial [458]. Adversaries [353, 345, 357, 403, 450, 472, 501, 236]. Adversary [173]. AES [373, 474, 346, 459]. AES-192 [474]. AES-256 [474]. AES-like [459]. after [76]. Against [353, 480, 520, 348, 500...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013