Real, recent, or replica : Precolumbian Caribbean heritage as art, commodity, and inspiration /Publisher: Tuscaloosa : The University of Alabama Press,
Date: [2021] This title can be found in 1 Iowa libraries.
Breaching the bronze wall : Franks at Mamluk and Ottoman courts and markets /Author: Apellaniz Ruiz de Galarreta, Francisco Javier,
Publisher: Leiden ; Brill,
Date: [2020] This title can be found in 1 Iowa libraries.
When an original is not original : the originality requirement in Belgian law /Author: Vandezande, Niels,
Publisher: Cambridge : Intersentia,
Date: [2019] This title can be found in 1 Iowa libraries.
Password /Author: Eve, Martin Paul,
Publisher: New York : Bloomsbury, Bloomsbury Academic, An Imprint of Bloomsbury Publishing Inc.,
Date: 2016. This title can be found in 1 Iowa libraries.
La partida de bautismo de Miguel de Cervantes y sus detractores /Author: Maganto Pavón, Emilio,
Publisher: Alcalá de Henares : Universidad de Alcalá,
Date: 2015. This title can be found in 1 Iowa libraries.
al-Ṣukūk al-istithmārīyah al-Islāmīyah : dirāsah muqāranah /Author: ʻĪd, ʻĀdil ʻAbd al-Faḍīl,
Publisher: al-Iskandarīyah : Dār al-Taʻlīm al-Jāmiʻī,
Date: 2015. This title can be found in 1 Iowa libraries.
From Russia with doubt : the quest to authenticate 181 would-be masterpieces of the Russian avant-garde /Author: Lerner, Adam,
Publisher: New York : Princeton Architectural Press,
Date: [2014] This title can be found in 1 Iowa libraries.
Secure data provenance and inference control with semantic web /Author: Thuraisingham, Bhavani M.
Publisher: Boca Raton : Taylor & Francis,
Date: 2014. This title can be found in 1 Iowa libraries.
Continuous authentication using biometrics : data, models, and metrics /Publisher: Hershey, PA : Information Science Reference,
Date: [2012] This title can be found in 1 Iowa libraries.
Recommendation for EAP methods used in wireless network access authenticationFormat: [electronic resource] /
Author: Hoeper, Katrin.
Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
An implementation of physical layer authentication using software radiosFormat: [electronic resource] /
Author: Yu, Paul.
Publisher: Adelphi, MD : Army Research Laboratory,
Date: [2009] This title can be found in 1 Iowa libraries.
Nova scienceNOW. 2009, episode 2Format: [videorecording] /
Publisher: [Boston] : WGBH Boston Video,
Date: 2009. This title can be found in 1 Iowa libraries.
Recommendation for EAP methods used in wireless network access authenticationFormat: [electronic resource] /
Author: Hoeper, Katrin.
Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2008] This title can be found in 1 Iowa libraries.
Hitler's lost planFormat: [videorecording].
Publisher: [New York, NY] : Distributed by New Video,
Date: [2008], c2004. This title can be found in 1 Iowa libraries.
Scannen von Papierdokumenten : Anforderungen, Trends und Empfehlungen /Publisher: Baden-Baden : Nomos,
Date: 2008. This title can be found in 2 Iowa libraries.
Recommendation for block cipher modes of operation Galois/Counter mode (GCM) for confidentiality and authentication /Format: [electronic resource] :
Author: Dworkin, Morris.
Publisher: [Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce,
Date: [2006] This title can be found in 1 Iowa libraries.
Recommendation for block cipher modes of operation the CMAC mode for authentication /Format: [electronic resource] :
Author: Dworkin, Morris.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,
Date: [2005] This title can be found in 1 Iowa libraries.
Smart cards and mobile handheld devices an overview and implementation /Format: [electronic resource] :
Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2005] This title can be found in 1 Iowa libraries.
Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiality /Format: [electronic resource] :
Author: Dworkin, Morris.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,
Date: [2004] This title can be found in 1 Iowa libraries.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.