Schneier, Bruce, 1963-....
Bruce Schneier American computer scientist
Schneier, Bruce
VIAF ID: 24690424 ( Personal )
Permalink: http://viaf.org/viaf/24690424
Preferred Forms
-
100 0 _ ‡a Bruce Schneier ‡c American computer scientist
-
100 0 _ ‡a Bruce Schneier ‡c American computer scientist
-
200 _ | ‡a Schneier ‡b Bruce ‡f 1963-....
-
100 1 _ ‡a Schneier, Bruce
-
-
-
-
-
100 1 _ ‡a Schneier, Bruce ‡d 1963-
-
100 1 _ ‡a Schneier, Bruce ‡d 1963-
-
100 1 _ ‡a Schneier, Bruce, ‡d 1963-
-
-
-
-
-
100 1 _ ‡a Schneier, Bruce, ‡d 1963-
-
-
-
-
100 1 _ ‡a Schneier, Bruce, ‡d 1963-
-
-
-
100 1 _ ‡a Schneier, Bruce, ‡d 1963-....
4xx's: Alternate Name Forms (26)
Works
Title | Sources |
---|---|
43 (2016, 27. okt./2. nov.), ISSN 1691-6166: |
![]() |
Angewandte Kryptographie |
![]() |
Applied Cryptography |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Applied cryptography : protocols, algorithms, and source code in C |
![]() ![]() ![]() |
Beyond Fear |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Bruce Schneier: The security mirage |
![]() |
Bugs in our Pockets: The Risks of Client-Side Scanning |
![]() |
Building PRFs from PRPs |
![]() |
Click here to kill everybody : security and survival in a hyper-connected world |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Click Here to Kill Everybody Sicherheitsrisiko Internet und die Verantwortung von Unternehmen und Regierungen |
![]() ![]() |
Crypto-gram newsletter |
![]() |
Cryptographie : en pratique |
![]() ![]() |
Dane i Goliat : ukryta bitwa o Twoje dane i kontrolę nad światem |
![]() |
Data and Goliath |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Data and Goliath : the hidden battles to collect your data and control your world |
![]() |
Data und Goliath die Schlacht um die Kontrolle unserer Welt ; wie wir uns gegen Überwachung, Zensur und Datenklau wehren können |
![]() ![]() |
Distributed proctoring |
![]() |
E-mail security |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
E-Mailセキュリティ |
![]() ![]() |
Economics of information security and privacy III |
![]() ![]() ![]() ![]() ![]() |
The electronic privacy papers : documents on the battle for privacy in the age of surveillance |
![]() ![]() ![]() ![]() |
Fast software encryption : 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000 : proceedings |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
FSE 2000 |
![]() |
Haz clic aquí para matarlos a todos : un manual de supervivencia |
![]() |
Īmēru sekyuriti |
![]() |
Improved Cryptanalysis of Rijndael |
![]() |
IoT Security: What’s Plan B? |
![]() |
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES |
![]() |
Key Schedule Weakness in SAFER+ |
![]() |
Kliknij tutaj aby zabić wszystkich : bezpieczeństwo i przetrwanie w hiperpołączonym świecie |
![]() |
Kryptografia dla praktyków : protokoły, algorytmy i programy źródłowe w języku C |
![]() ![]() |
Die Kunst des Vertrauens |
![]() ![]() ![]() |
Liars and outliers : enabling the trust that society needs to thrive |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
n93043083 |
![]() |
Ochrona poczty elektronicznej : jak chronić prywatność korespondencji w sieci Internet ? |
![]() ![]() |
Protocol interactions and the chosen protocol attack |
![]() |
Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA |
![]() |
Remote auditing of software outputs using a trusted coprocessor |
![]() |
Second Preimages on n-Bit Hash Functions for Much Less than 2ⁿ Work |
![]() |
Secrets & lies IT-Sicherheit in einer vernetzten Welt |
![]() |
Secrets and lies : digital security in a networked world |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Secrets et mensonges : sécurité numérique dans un monde en réseau |
![]() ![]() ![]() |
Secure applications of low-entropy keys |
![]() |
Secure audit logs to support computer forensics |
![]() |
Secure Authentication with Multiple Parallel Keys |
![]() |
Securing medical research: a cybersecurity point of view. |
![]() |
Security 2020 Reduce Security Risks This Decade |
![]() |
Security savvy : a visual guide |
![]() |
Segurança.com : segredos e mentiras sobre a proteção na vida digital |
![]() |
Sekyuriti wa naze yaburaretanoka. |
![]() |
A Self-Study Course in Block-Cipher Cryptanalysis |
![]() |
Shinrai to uragiri no shakai. |
![]() |
Side channel cryptanalysis of product ciphers |
![]() |
Smart card research and applications : third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998 : proceedings |
![]() ![]() ![]() ![]() ![]() |
Syunaieo on sikyuriti |
![]() |
The Twofish encryption algorithm : a 128-bit block cipher |
![]() ![]() ![]() ![]() ![]() |
Unbalanced Feistel networks and block cipher design |
![]() |
We have root : even more advice from Schneier on security |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator |
![]() |
당신은 데이터의 주인이 아니다 빅데이터 시대의 생존과 행복을 위한 가이드 |
![]() |
모두를 죽이려면 여기를 클릭하세요 TMI, 초연결 네트워크 사회의 보안과 생존 전략 |
![]() |
비밀과 거짓말 |
![]() |
슈나이어 온 시큐리티 안전한 보안에 대해 생각하다 |
![]() |
실용 암호학 보안 실무자를 위한 정보 보호와 암호화 구현 |
![]() |
セキュリティはなぜやぶられたのか |
![]() ![]() |
信頼と裏切りの社会 |
![]() ![]() |
暗号の秘密とウソ : ネットワーク社会のデジタルセキュリティ |
![]() ![]() |
暗号技術大全 |
![]() ![]() |
超監視社会 : 私たちのデータはどこまで見られているのか? |
![]() |