Free Delivery Over $100
3712 books were found.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services,... Read More >>
NIST SP 800-133 Cryptography is often used in an information technology security environment to protect data that... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
Read More >>
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect... Read More >>
The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security... Read More >>
* Sorting, often perceived as rather technical, is not treated as a separate chapter, but is used in many examples... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security,... Read More >>
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation... Read More >>
Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus... Read More >>
A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing,... Read More >>
The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn... Read More >>
Aus der Analyse bisheriger Ansätze des Data Warehousing werden in diesem Buch Lösungen für essenzielle Problemstellungen... Read More >>
This Third Edition expands treatment of communication theories underlying wireless, and especially advanced techniques... Read More >>
This book not only brings together current sources of information on spyware and adware but also looks at the future... Read More >>
Excellent textbook of multimedia signal processing also dealing with the optimization of multimedia communication... Read More >>
The International Colloquium on Mathematics and Computer Science is a biennial event that first took place at the... Read More >>
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012,... Read More >>
PREFACE The increasing demand on high data rate and quality of service in wireless communication has to cope with... Read More >>