Secure cryptoprocessor (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Secure cryptoprocessor" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
3rd place
3rd place
5th place
5th place
low place
low place
99th place
77th place
67th place
64th place
670th place
480th place
488th place
374th place
741st place
577th place
3,722nd place
2,509th place
low place
low place
low place
low place
355th place
454th place
low place
low place
2nd place
2nd place
11th place
8th place
low place
low place
low place
low place

apple.com (Global: 67th place; English: 64th place)

support.apple.com

bloomberg.com (Global: 99th place; English: 77th place)

books.google.com (Global: 3rd place; English: 3rd place)

cam.ac.uk (Global: 670th place; English: 480th place)

admin.cam.ac.uk

columbia.edu (Global: 488th place; English: 374th place)

cs.columbia.edu

doi.org (Global: 2nd place; English: 2nd place)

eetimes.com (Global: 3,722nd place; English: 2,509th place)

f5.com (Global: low place; English: low place)

gtug.de (Global: low place; English: low place)

hpe.com (Global: low place; English: low place)

h41382.www4.hpe.com

nist.gov (Global: 355th place; English: 454th place)

prices.org (Global: low place; English: low place)

princeton.edu (Global: 741st place; English: 577th place)

citp.princeton.edu

securitycurrent.com (Global: low place; English: low place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

slideheaven.com (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

  • Digital rights management : concepts, methodologies, tools, and applications. Information Resources Management Association. Hershey, Pa.: Information Science Reference (an imprint of IGI Global). 2013. p. 609. ISBN 9781466621374. OCLC 811354252.{{cite book}}: CS1 maint: others (link)
  • Konheim, Alan G. (1 April 2016). "Automated teller machines: their history and authentication protocols". Journal of Cryptographic Engineering. 6 (1): 1–29. doi:10.1007/s13389-015-0104-3. ISSN 2190-8516. S2CID 1706990. Archived from the original on 22 July 2019. Retrieved 30 September 2019.