Search Results

Filter
  • 1-10 of  19 results for ""COMPUTER security""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Classical command of quantum systems.

Subjects: QUANTUM computing; CRYPTOGRAPHY; QUANTUM mechanics

  • Source: Nature. 4/25/2013, Vol. 496 Issue 7446, p456-460. 5p. 2 Diagrams.

Record details

×
Academic Journal

Who's been looking at your data?

Subjects: COMPUTER hackers; COMPUTER crimes; COMPUTER securityUNITED States

  • Source: Nature. 8/8/2002, Vol. 418 Issue 6898, p580. 3p. 8 Color Photographs.

Record details

×
Academic Journal

Computing: Secure the Internet.

Subjects: COMPUTER technicians; COMPUTER hackers; ELECTRONIC Frontier Foundation

  • Source: Nature. 11/15/2012, Vol. 491 Issue 7424, p325-326. 2p. 1 Color Photograph.

Record details

×
Academic Journal

Computing: The security of knowing nothing.

Subjects: ZERO-knowledge proofs; CRYPTOGRAPHY; COMPUTER security

  • Source: Nature. 4/26/2007, Vol. 446 Issue 7139, p992-993. 2p. 1 Diagram.

Record details

×
Academic Journal

Security first.

Subjects: COMPUTER security

  • Source: Nature. 4/29/2010, Vol. 464 Issue 7293, p1246-1246. 1p.

Record details

×
Academic Journal

Pentagon turns to 'softer' sciences.

Subjects: UNITED States. Dept. of Defense; LEMNIOS, Zachary; MILITARY readinessUNITED States

  • Source: Nature. 4/15/2010, Vol. 464 Issue 7291, p970-970. 1p. 1 Color Photograph.

Record details

×
  • 1-10 of  19 results for ""COMPUTER security""