Free Delivery Over $100
3712 books were found.
Read More >>
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security... Read More >>
This book constitutes the refereed proceedings of the International Conference on Information and Communication... Read More >>
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in... Read More >>
Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding... Read More >>
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track... Read More >>
This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference,... Read More >>
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013,... Read More >>
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software... Read More >>
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols,... Read More >>
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,... Read More >>
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,... Read More >>
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray... Read More >>
It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data... Read More >>
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results... Read More >>
Addressing the various security issues confronting our Information Society, this title covers the following topics:... Read More >>
For over 30 years, the Maxent workshops have explored Bayesian and Maximum Entropymethods in scientific, engineering,... Read More >>