ID: CBA000127005

Cryptography

Show 13 citations related to Cryptography
Show 13 citations related to Cryptography as a subject or category


Permalink
data.isiscb.org/p/isis/authority/CBA000127005
Publications timeline | Click to expand
Updated timeline is loading. Please wait. The server may be processing several jobs...
Related places

Related Citations

Book Paolo Bonavoglia (2023)
La crittografia della Repubblica di Venezia. (/p/isis/citation/CBB820423644/) unapi

Article T. Alex Reid (2023)
Monte Sala's Cryptographic Achievements. IEEE Annals of the History of Computing (pp. 65-71). (/p/isis/citation/CBB117246267/) unapi

Article Sarah Myers West (June 2022)
Cryptography as information control. Social Studies of Science (pp. 353-375). (/p/isis/citation/CBB869396949/) unapi

Article Jerome H. Saltzer (January-March 2021)
On the Origin of Kerberos. IEEE Annals of the History of Computing (pp. 89-91). (/p/isis/citation/CBB051933073/) unapi

Article Thomas Haigh; Mark Priestley (July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities. Technology and Culture (pp. 871-900). (/p/isis/citation/CBB455159316/) unapi

Article Nicholas Paul Sheppard (March 2020)
Can Smart Contracts Learn from Digital Rights Management?. IEEE Technology and Society Magazine (pp. 69-75). (/p/isis/citation/CBB343046132/) unapi

Book Guido Braun; Susanne Lachenicht (2020)
Spies, Espionage and Secret Diplomacy in the Early Modern Period.. (/p/isis/citation/CBB447003065/) unapi

Article Foley, Jillian (March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations. Technology's Stories. (/p/isis/citation/CBB627277329/) unapi

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; et al. (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications. IEEE Technology and Society Magazine (pp. 71-79). (/p/isis/citation/CBB353680957/) unapi

Book Lennon, Brian (2018)
Passwords: philology, security, authentication. (/p/isis/citation/CBB427866448/) unapi

Article DuPont, Quinn; Fidler, Bradley (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73). (/p/isis/citation/CBB760734420/) unapi

Book Andrew Hodges; Douglas Hofstadter (2014)
Alan Turing: The Enigma: The Book That Inspired the Film "The Imitation Game". (/p/isis/citation/CBB485951446/) unapi

Article Emilio Matricciani; Tullia Norando; Paola Magnaghi Delfino (2013)
How did Polybius perfect Cleoxenus and Democleitus signalling method, 2200 years ago?. Technai, An International Journal for Ancient Science and Technology (pp. 33-46). (/p/isis/citation/CBB345497918/) unapi

Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment