Free Delivery Over $100
3712 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics... Read More >>
The focus of this monograph is on symmetry breaking problems in the message-passing model of distributed computing.... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on... Read More >>
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded... Read More >>
Although several books cover the coding theory of wireless communications and the hardware technologies and coding... Read More >>
Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE... Read More >>
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies,... Read More >>
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying... Read More >>
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits—from... Read More >>
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security... Read More >>
This volume discusses various aspects of the capacity/achievable data rate of stationary Rayleigh fading channels,... Read More >>
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International... Read More >>
A major new theme in this area of research is that of codes and systems based on graphical models. This volume contains... Read More >>
Read More >>
Also included are papers from the chairpersons of the six IFIP Working Groups on education (elementary/primary education,... Read More >>
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and... Read More >>
This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security,... Read More >>
Explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application... Read More >>