Search Results - "cryptography"
Suggested Subjects within your search.
Suggested Subjects within your search.
- Cryptography 5
- History 2
- Authorship 1
- Bacon-Shakespeare controversy 1
- Baconian theory 1
- Computer file sharing 1
- Electronic intelligence 1
- Military intelligence 1
- Secret service 1
- Space debris 1
- Symbolism 1
- Tracking 1
- Vulnerability (Personality trait) 1
- Vulnerability (Personality trait) in literature 1
- World War, 1939-1945 1
-
1
-
2
-
3
Mercury, or, The secret and swift messenger : shewing how a man may with privacy and speed communicate his thoughts to a friend at any distance,
Imprint 1694Subjects: “…Cryptography.…”
Access full-text online via Adam Matthew Digital
Electronic -
4
Real Life Cryptology.
Imprint 2018Table of Contents: “…Theory and practice of cryptography in early modern Europe --…”
Access full-text online via JSTOR
Electronic -
5
Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing /
Imprint 2014Subjects: Access full-text online via JSTOR
Electronic -
6
Breaking Japanese diplomatic codes : David Sissons and D Special Section during the Second World War
Imprint 2013Subjects: “…World War, 1939-1945 Cryptography.…”
Access full-text online via JSTOR
Electronic -
7
Mediating vulnerability : comparative approaches and questions of genre
Imprint 2021Table of Contents: “…Writing in a minor key -- Acknowledgements -- Notes -- Bibliography -- 10 The cryptographic narrative in video games: the player as detective -- Narrative cryptography -- Structure of cryptographic narrative within video games -- The function of cryptographic narrative in video games -- The case of Five Nights at Freddy's -- Conclusion -- Notes -- Bibliography -- Gameography -- 11 Narrating pornographic images: photographic description and ekphrasis in De fotograaf by Jef Geeraerts -- Visuality in pornographic prose -- Literature and photography…”
Access full-text online via JSTOR
Electronic -
8