Schneier, Bruce, 1963-....
Bruce Schneier American computer scientist
Schneier, Bruce
VIAF ID: 24690424 (Personal)
Permalink: http://viaf.org/viaf/24690424
Preferred Forms
- 100 0 _ ‡a Bruce Schneier ‡c American computer scientist
- 100 0 _ ‡a Bruce Schneier ‡c American computer scientist
- 200 _ | ‡a Schneier ‡b Bruce ‡f 1963-....
-
- 100 1 _ ‡a Schneier, Bruce
-
-
-
- 100 1 _ ‡a Schneier, Bruce ‡d 1963-
- 100 1 _ ‡a Schneier, Bruce ‡d 1963-
-
-
-
-
- 100 1 _ ‡a Schneier, Bruce, ‡d 1963-
- 100 1 _ ‡a Schneier, Bruce, ‡d 1963-
-
-
-
-
-
- 100 1 _ ‡a Schneier, Bruce, ‡d 1963-
-
- 100 1 _ ‡a Schneier, Bruce, ‡d 1963-....
4xx's: Alternate Name Forms (31)
5xx's: Related Names (1)
Works
Title | Sources |
---|---|
43 (2016, 27. okt./2. nov.), ISSN 1691-6166: | |
Angewandte Kryptographie | |
Applied Cryptography | |
Applied cryptography : protocols, algorithms, and source code in C | |
Beyond Fear | |
Bruce Schneier: The security mirage | |
Bugs in our Pockets: The Risks of Client-Side Scanning | |
Building PRFs from PRPs | |
Click here to kill everybody. | |
Crypto-gram newsletter | |
Cryptographie : en pratique | |
Dane i Goliat : ukryta bitwa o Twoje dane i kontrolę nad światem | |
Data and Goliath | |
Data and Goliath : the hidden battles to collect your data and control your world | |
Data und Goliath die Schlacht um die Kontrolle unserer Welt ; wie wir uns gegen Überwachung, Zensur und Datenklau wehren können | |
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) | |
Distributed proctoring | |
E-mail security | |
E-Mailセキュリティ | |
Economics of information security and privacy III | |
The electronic privacy papers : documents on the battle for privacy in the age of surveillance | |
Fast software encryption : 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000 : proceedings | |
A hacker's mind : how the powerful bend society's rules, and how to bend them back | |
Haz clic aquí para matarlos a todos : un manual de supervivencia | |
Īmēru sekyuriti | |
IoT Security: What’s Plan B? | |
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES | |
Key Schedule Weakness in SAFER+ | |
Keys under doormats: mandating insecurity by requiring government access to all data and communications | |
Kliknij tutaj aby zabić wszystkich : bezpieczeństwo i przetrwanie w hiperpołączonym świecie | |
Kryptografia dla praktyków : protokoły, algorytmy i programy źródłowe w języku C | |
Die Kunst des Vertrauens | |
Liars and outliers : enabling the trust that society needs to thrive | |
Little brother | |
Mod n Cryptanalysis, with Applications against RC5P and M6 | |
n93043083 | |
Ochrona poczty elektronicznej : jak chronić prywatność korespondencji w sieci Internet ? | |
Remote auditing of software outputs using a trusted coprocessor | |
The risks of key recovery, key escrow, and trusted third-party encryption | |
Second Preimages on n-Bit Hash Functions for Much Less than 2ⁿ Work | |
Secrets & lies IT-Sicherheit in einer vernetzten Welt | |
Secrets and lies : digital security in a networked world | |
Secrets et mensonges : sécurité numérique dans un monde en réseau | |
Secure applications of low-entropy keys | |
Secure audit logs to support computer forensics | |
Secure Authentication with Multiple Parallel Keys | |
Securing medical research: a cybersecurity point of view | |
Security 2020 Reduce Security Risks This Decade | |
Segurança.com : segredos e mentiras sobre a proteção na vida digital | |
Sekyuriti wa naze yaburaretanoka. | |
A Self-Study Course in Block-Cipher Cryptanalysis | |
Shinrai to uragiri no shakai. | |
Smart card research and applications : third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998 : proceedings | |
Syunaieo on sikyuriti | |
The Twofish encryption algorithm : a 128-bit block cipher | |
Unbalanced Feistel networks and block cipher design | |
We have root : even more advice from Schneier on security | |
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator | |
당신은 데이터의 주인이 아니다 빅데이터 시대의 생존과 행복을 위한 가이드 | |
모두를 죽이려면 여기를 클릭하세요 TMI, 초연결 네트워크 사회의 보안과 생존 전략 | |
비밀과 거짓말 | |
실용 암호학 보안 실무자를 위한 정보 보호와 암호화 구현 | |
해커의 심리 사회 규범과 정의를 왜곡하는 사회적 해킹의 실체를 폭로한다 | |
セキュリティはなぜやぶられたのか | |
信頼と裏切りの社会 | |
暗号の秘密とウソ : ネットワーク社会のデジタルセキュリティ | |
暗号技術大全 | |
超監視社会 : 私たちのデータはどこまで見られているのか? |