Search Results (12 titles)

Searched over 7.2 Billion pages in 5.7 seconds

 
Cryptography (X)

       
1
Records: 1 - 12 of 12 - Pages: 
  • Cover Image

Rank Distance Bicodes and Their Generalization

By: Florentin Smarandache; W. B. Vasantha Kandasamy
Read More
  • Cover Image

Return of Sherlock Holmes, The

By: Sir Arthur Conan Doyle

...t he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)...

Read More
  • Cover Image

Eight Hundred Leagues on the Amazon

By: Jules Verne

...First published in 1881, Eight Hundred Miles on the Amazon is an adventure novel in two parts by Jules Verne, having elements of codes and cryptography. Unlike many of his other stories, it is not a work of science fiction. Rather, it describes a voyage down the Amazon River on a large raft, or jangada). Many aspects of the raft, scenery, and journey are describ...

Read More
  • Cover Image

International Journal of Mathematical Combinatorics : Volume 3, October 2008

By: Linfan Mao

...ntents Extending Homomorphism Theorem to Multi-Systems BY LINFAN MAO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 01 A Double Cryptography Using the Smarandache Keedwell Cross Inverse Quasigroup BY T. G. JA´IY´EOL´A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 On the Time-like Curves of Constant Breadth in Minkowski 3-Space ...

Read More
  • Cover Image

The Hitler File : A Novel of Fact

By: Sam Vaknin

...t then occurred to me: steganography.” I stared at him blankly. “You heard of cryptography?” I did. Well, vaguely, at least. “Cryptograph... ...e as the key that is needed to decode it?” “Precisely. It’s known as public-key cryptography.” “I don’t understand how this is possible.” – Li... ...ntelligible again?” “You are right.” – agreed Dan – “This is the basis of classic cryptography. But imagine that you have an algorithm, a sort of ...

Read More
  • Cover Image

A History of U. S. Communications Security (Volumes I and Ii);1973

By: David G. Boak

...f trying to hide anythirtR ... particularly if the techniques you apply to hide information-like cryptography -entaD money, loss 01 time, and constrai... ...will try to fix in your minda a number of rather basic notions or approaches that are applied in cryptography as well as a number of specific techniqu... ...of literature-like the Friedman lectures-which is worth your time and which wiD trace the art of cryptography or ciphering back to Caesar or therabout... ...ET SIZE •• .••. • • •• _. • __ 19 EQUIPMENT CLASSIFICATION • •••'. • • • __ '" ___ ___ 21 PUBLIC CRYPTOGRAPHY-SOME CAUSES & CONSEQUENCES • __ • • •• _... ...YPTOGRAPHY-SOME CAUSES & CONSEQUENCES • __ • • •• _••• _ 27 PKC . • • ._._._._______ 33 COMPUTER CRYPTOGRAPHY. _. • • _. •• ________ 35 Jl()STSCRIPT .... ...EGRET lr------- ~ 27 ORIGINAL ~/.. , ---" ---., ./"..•- ...--., ./' --- .~./ EO 1. 4. (c) PUBLIC CRYPTOGRAPHY-SOME CAUSES a CONSEQUENCES (U) This stra... ... their own design and UDder tbeir own control. Similarly, the lJDOunt of pUblisbed literature on cryptography, and particularly on sophisticated crypt... ... systems in the Government. They, especially, perceived a requirement for commercial sources for cryptography to protect Government computer commUDica... ... Government rather than bavins the Govcrnmc.ot compete with IndustJy :- and this does not uclude cryptography. ~le, in DoD, Technology Transfer is vie...

Read More
  • Cover Image

The Public Domain : Enclosing the Commons of the Mind

By: James Boyle

... Why have an ex- emption at all, in that case? I would have told an academic cryptography researcher that he need not fear legal threats from copyrigh... ...here is a moral continuum. There is clearly legitimate computer security and cryptography research, which includes The Farmers’ T ale 93 ___-1 ___0 __... ...used in ways that the critics feared. There are genuine scandals, of course— cryptography research has been chilled, the DMCA has been turned to anti-... ...ess restrictive law. But with the exception of a few important areas—such as cryptography research, where its effects are reported to be severe—I woul... ...ndustry Association of America): and letter threatening litiga- tion sent to cryptography researcher, 270n44; and role in politics of intellec- tual p...

Read More
  • Cover Image

The Future of the Internet : And How to Stop It

By: Jonathan Zittrain

...6. Spafford, supra note 5, at 678–81. 37. Id. at 680. 38. Id. 39. Matt Blaze, Cryptography Policy and the Information Economy, WS., Note... ... 38–42 261 Apr. 5, 2000, available at http://windowsecurity.com/whitepapers/cryptography_Policy _and_the_Information_Economy.html. 40. Increases in c...

Read More
  • Cover Image

Capitalistic Musings

By: Sam Vaknin

...implementation) is more rare. There are numerous examples. The invention of modern cryptography led to the formation of a host of governmental inst...

Read More
  • Cover Image

Trendsiters Digital Content and Web Technologies

By: Sam Vaknin

...ation) is more rare. There are numerous examples. The invention of modern cryptography led to the formation of a host of governmental institutions a...

Read More
  • Cover Image

Cyclopedia of Economics

By: Sam Vaknin

...implementation) is more rare. There are numerous examples. The invention of modern cryptography led to the formation of a host of governmental inst...

Read More
  • Cover Image

Cyclopedia of Philosophy

By: Sam Vaknin

...implementation) is more rare. There are numerous examples. The invention of modern cryptography led to the formation of a host of governmental inst...

Read More
       
1
Records: 1 - 12 of 12 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.