Works matching Cryptology
1
- Ekonomické Listy, 2017, n. 1, p. 39
- Coufal, Jan;
- Tobíšek, Jiří
- Article
2
- Turkish Journal of Electrical Engineering & Computer Sciences, 2010, v. 18, n. 2, p. 225, doi. 10.3906/elk-0907-140
- DALKIRAN, İlker;
- DANIŞMAN, Kenan
- Article
3
- Mathematics (2227-7390), 2021, v. 9, n. 18, p. 2183, doi. 10.3390/math9182183
- Jara-Vera, Vicente;
- Sánchez-Ávila, Carmen
- Article
4
- International Journal of Information Security & Privacy, 2012, v. 6, n. 3, p. 1, doi. 10.4018/jisp.2012070101
- Rwabutaza, Allan;
- Ming Yang;
- Bourbakis, Nikolaos
- Article
5
- Cryptologia, 2014, v. 38, n. 2, p. 133, doi. 10.1080/01611194.2014.885801
- Article
6
- Cryptologia, 2010, v. 34, n. 2, p. 155, doi. 10.1080/01611190903225421
- Article
7
- Journal of Research on Technology in Education, 2024, v. 56, n. 4, p. 373, doi. 10.1080/15391523.2022.2150726
- Wusylko, Christine;
- Xu, Zhen;
- Dawson, Kara M.;
- Antonenko, Pavlo D.;
- Koh, Do Hyong;
- Lee, Minyoung;
- Benedict, Amber E.;
- Bhunia, Swarup
- Article
8
- Issues in Information Systems, 2016, v. 17, n. 4, p. 98
- Article
10
- Educational Technology & Society, 2014, v. 17, n. 1, p. 197
- Adamovic, Sasa;
- Sarac, Marko;
- Veinovic, Mladen;
- Milosavljevic, Milan;
- Jevremovic, Aleksandar
- Article
11
- Cryptologia, 2014, v. 38, n. 3, p. 223, doi. 10.1080/01611194.2014.915256
- Article
12
- Cryptologia, 2012, v. 36, n. 1, p. 14, doi. 10.1080/01611194.2011.632803
- Article
13
- Cryptologia, 2010, v. 34, n. 1, p. 27, doi. 10.1080/01611190902908175
- Article
14
- Cryptologia, 2008, v. 32, n. 1, p. 45, doi. 10.1080/01611190701489732
- Article
15
- Journal of Information Science & Engineering, 2020, v. 36, n. 5, p. 1141, doi. 10.6688/JISE.202009_36(5).0014
- Article
16
- Cryptologia, 2009, v. 33, n. 4, p. 297, doi. 10.1080/01611190903030904
- Article
17
- Computers, Materials & Continua, 2024, v. 78, n. 1, p. 589, doi. 10.32604/cmc.2023.042386
- Zahra, Syeda Wajiha;
- Nadeem, Muhammad;
- Arshad, Ali;
- Riaz, Saman;
- Bakr, Muhammad Abu;
- Dutta, Ashit Kumar;
- Alzaid, Zaid;
- Almutairi, Badr;
- Almotairi, Sultan
- Article
18
- International Journal of InformaticsTechnologies, 2021, v. 14, n. 1, p. 53, doi. 10.17671/gazibtd.733309
- Article
19
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 618, doi. 10.14569/ijacsa.2024.0150761
- Majdoubi, Chaymae;
- El Mendili, Saida;
- Gahi, Youssef
- Article
20
- Advances & Applications in Discrete Mathematics, 2023, v. 40, n. 2, p. 195, doi. 10.17654/0974165823066
- Aydınyüz, Süleyman;
- Aşcı, Mustafa
- Article
21
- Afyon Kocatepe University Journal of Science & Engineering / Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 2018, v. 18, n. 3, p. 888, doi. 10.5578/fmbd.67746
- Sevindir, Hülya Kodal;
- Sayın, Nilhan
- Article
22
- Computer Science Journal of Moldova, 2016, v. 24, n. 1, p. 55
- Moldovyan, N. A.;
- Shcherbacov, A. V.;
- Shcherbacov, V. A.
- Article
23
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 253, doi. 10.1049/iet-ifs.2020.0128
- Article
24
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 247, doi. 10.1049/iet-ifs.2018.0049
- Article
25
- ISSA Journal, 2020, v. 18, n. 5, p. 33
- Article
26
- Mathematics & Computer Education, 2007, v. 41, n. 3, p. 211
- Article
27
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 6, p. 4860, doi. 10.11591/ijece.v9i6.pp4860-4865
- Manasreh, Adnan;
- Sharadqh, Ahmed A. M.;
- Alkasassbeh, Jawdat S.;
- Al-Qaisi, Aws
- Article
28
- Computer Modeling in Engineering & Sciences (CMES), 2022, v. 131, n. 1, p. 277, doi. 10.32604/cmes.2022.017898
- Asci, Mustafa;
- Aydinyuz, Suleyman
- Article
29
- Strategic Analysis, 2004, v. 28, n. 2, p. 219, doi. 10.1080/09700160408450129
- Article
30
- American Statistician, 2011, v. 65, n. 4, p. 255, doi. 10.1198/tas.2011.10191
- Article
31
- 2024
- Dunin, Elonka;
- Schmeh, Klaus
- Book Review
32
- Cryptologia, 2020, v. 44, n. 3, p. 285, doi. 10.1080/01611194.2019.1659447
- Article
33
- Computer Science Journal of Moldova, 2009, v. 17, n. 2, p. 193
- Article
34
- Resonance: Journal of Science Education, 2013, v. 18, n. 2, p. 199, doi. 10.1007/s12045-013-0026-2
- Article
35
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 1, doi. 10.1049/ise2.12096
- Article
37
- Mathematics & Computer Education, 2005, v. 39, n. 1, p. 56
- Dence, Thomas P.;
- Heath, Steven
- Article
39
- Computational Intelligence, 2004, v. 20, n. 3, p. 463, doi. 10.1111/j.0824-7935.2004.00246.x
- Millan, William;
- Fuller, Joanne;
- Dawson, Ed
- Article
40
- International Journal of InformaticsTechnologies, 2020, v. 13, n. 2, p. 183, doi. 10.17671/gazibtd.559235
- PAŞAOĞLU, Cengiz;
- CEVHEROĞLU, Emel
- Article
43
- Strategic Finance, 2016, v. 97, n. 11, p. 55
- Article
45
- Cryptologia, 2021, v. 45, n. 1, p. 94, doi. 10.1080/01611194.2020.1793824
- Article
46
- Cryptologia, 2021, v. 45, n. 1, p. 81, doi. 10.1080/01611194.2020.1858371
- Article
48
- Cryptologia, 2014, v. 38, n. 3, p. 276, doi. 10.1080/01611194.2014.915682
- Article