Works matching World War II -- Cryptography
1
- Communication Booknotes Quarterly, 1999, v. 30, n. 3, p. 151, doi. 10.1080/10948009909361621
- Article
2
- History Today, 1993, v. 43, n. 9, p. 15
- Article
3
- Applied Physics B: Lasers & Optics, 2007, v. 89, n. 2/3, p. 181, doi. 10.1007/s00340-007-2793-5
- Bux, S.;
- Krenz, G.;
- Slama, S.;
- Zimmermann, C.;
- Courteille, Ph.W.
- Article
5
- Journal of Military History, 2010, v. 74, n. 4, p. 1229
- Article
7
- reFRESH Magazine, 2008, n. 52, p. 36
- Article
9
- WLA, 2005, v. 17, n. 1/2, p. 22
- Article
10
- Cryptologia, 2017, v. 41, n. 4, p. 329, doi. 10.1080/01611194.2016.1219788
- Article
11
- Cryptologia, 2017, v. 41, n. 4, p. 295, doi. 10.1080/01611194.2016.1219786
- Article
12
- Cryptologia, 2014, v. 38, n. 2, p. 116, doi. 10.1080/01611194.2013.797051
- Chang, Kelly;
- Low, Richard M.;
- Stamp, Mark
- Article
13
- Cryptologia, 2014, v. 38, n. 2, p. 152, doi. 10.1080/01611194.2013.797050
- Article
14
- Cryptologia, 2014, v. 38, n. 1, p. 61, doi. 10.1080/01611194.2013.797046
- Article
16
- Cryptologia, 2012, v. 36, n. 4, p. 295, doi. 10.1080/01611194.2012.713803
- Turing, Alan M.;
- Bayley, D.
- Article
17
- Cryptologia, 2011, v. 35, n. 3, p. 267, doi. 10.1080/01611194.2011.558609
- Article
18
- Cryptologia, 2011, v. 35, n. 3, p. 277, doi. 10.1080/01611194.2011.595623
- Article
19
- Cryptologia, 2011, v. 35, n. 3, p. 247, doi. 10.1080/01611194.2011.559790
- Article
20
- Cryptologia, 2011, v. 35, n. 1, p. 1, doi. 10.1080/01611194.2010.533254
- Article
21
- Cryptologia, 2011, v. 35, n. 1, p. 16, doi. 10.1080/01611194.2010.533256
- Ertel, Wolfgang;
- Jans, Lucia;
- Herzhauser, Walter;
- Fessler, Joachim
- Article
22
- Cryptologia, 2011, v. 35, n. 1, p. 22, doi. 10.1080/01611194.2010.509182
- Article
24
- Cryptologia, 2009, v. 33, n. 4, p. 343, doi. 10.1080/01611190903186003
- Article
25
- Cryptologia, 2009, v. 33, n. 2, p. 166, doi. 10.1080/01611190802562809
- Article
27
- Cryptologia, 2008, v. 32, n. 2, p. 101, doi. 10.1080/01611190801916634
- Article
28
- Cryptologia, 2008, v. 32, n. 2, p. 104, doi. 10.1080/01611190801914290
- Article
30
- Intelligence & National Security, 2018, v. 33, n. 1, p. 139, doi. 10.1080/02684527.2017.1303222
- Article
31
- Intelligence & National Security, 2012, v. 27, n. 4, p. 513, doi. 10.1080/02684527.2012.688305
- Article
33
- Intelligence & National Security, 2009, v. 24, n. 6, p. 865, doi. 10.1080/02684520903320477
- Article
34
- Intelligence & National Security, 2007, v. 22, n. 3, p. 367, doi. 10.1080/02684520701415164
- Article
35
- Indian Economic & Social History Review, 2010, v. 47, n. 2, p. 141, doi. 10.1177/001946461004700201
- Article
36
- Ethnohistory, 2009, v. 56, n. 2, p. 269, doi. 10.1215/00141801-2008-058
- Article
37
- Whispering Wind, 2012, v. 41, n. 1, p. 21
- Article
38
- Interaction Studies, 2008, v. 9, n. 3, p. 403, doi. 10.1075/is.9.3.03geo
- Geoghegan, Bernard Dionysius
- Article