Free Delivery Over $100
3712 books were found.
Analysis of information transfer has found rapid adoption in neuroscience, where a highly dynamic transfer of information... Read More >>
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and... Read More >>
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management,... Read More >>
Examines an array of multidisciplinary applications and research developments in the field of cryptology and communication... Read More >>
This fascinating book presents the timeless mathematical theory underpinning cryptosystems both old and new, written... Read More >>
There are two main approaches in the theory of network error correction coding. In addition, some important and... Read More >>
Read More >>
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum... Read More >>
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and... Read More >>
Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary... Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks... Read More >>
To facilitate easy understanding of the models and analysis, the background information in terms of probability... Read More >>
This book focuses on classical noise modeling and its practical applications, covering such topics as statistical... Read More >>
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography,... Read More >>
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS... Read More >>
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014,... Read More >>
The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box... Read More >>