Free Delivery Over $100
3712 books were found.
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference... Read More >>
An Elementary Introduction. Historical and mathematical tour of cryptography, from classical ciphers to quantum... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security,... Read More >>
Video Coding Standards Read More >>
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications... Read More >>
For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and... Read More >>
The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security... Read More >>
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC... Read More >>
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure... Read More >>
Presents the benefits of the synergetic effect of combination of coding and cryptography. This book introduces directions... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied... Read More >>
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based... Read More >>
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on... Read More >>
Read More >>
Introducing both the probabilistic and algebraic aspects of the subject, this book provides relevant background... Read More >>
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications... Read More >>
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference... Read More >>
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013,... Read More >>
This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic... Read More >>
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security... Read More >>