Coding theory & cryptology books

3712 books were found.

Arithmetic of Finite Fields: 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings

Arithmetic of Finite Fields: 4th International Workshop,...

Author: Ferruh Özbudak ,  Francisco Rodriguez-Henriquez
ISBN: 9783642316616
Format: Paperback
$131.97

This book constitutes the refereed proceedings of the 4th International Workshop on the Arithmetic of Finite Field,...  Read More >>

Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers

Trusted Systems: Third International Conference, INTRUST...

Author: Liqun Chen ,  Moti Yung
ISBN: 9783642322976
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted...  Read More >>

Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings

Information Theoretic Security: 6th International Conference,...

Author: Adam Smith
ISBN: 9783642322839
Format: Paperback
$190.08

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS...  Read More >>

God's Secret Code

God's Secret Code

Author: David Stephens
ISBN: 9780956623973
Format: Paperback
$31.05

Professor Halloway, an American archaeologist, has spent more than twenty years digging at the foot of Mount Karkom...  Read More >>

Group Cell Architecture for Cooperative Communications

Group Cell Architecture for Cooperative Communications...

Author: Xiaofeng Tao ,  Qimei Cui
ISBN: 9781461443186
Format: Paperback
$145.17

Focuses on the Group Cell architecture with multi-cell generalized coordination, Contrast Analysis between Group...  Read More >>

Wirtschaftsspionage und Intelligence Gathering: Neue Trends der wirtschaftlichen Vorteilsbeschaffung

Wirtschaftsspionage und Intelligence Gathering: Neue...

Author: Alexander Tsolkas ,  Friedrich Wimmer
ISBN: 9783834815392
Format: Paperback
$131.97

Alexander Tsolkas und Friedrich Wimmer erklären anhand von Beispielen, welche Informationen aus diesen im Wirtschaftskreislauf...  Read More >>

Progress in Cryptology -- AFRICACRYPT 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings

Progress in Cryptology -- AFRICACRYPT 2012: 5th International...

Author: Aikaterini Mitrokotsa ,  Serge Vaudenay
ISBN: 9783642314094
Format: Paperback
$145.17

They are organized in topical sections on signature schemes, stream ciphers, applications of information theory,...  Read More >>

Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings

Information Security and Privacy: 17th Australasian...

Author: Willy Susilo ,  Yi Mu
ISBN: 9783642314476
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy,...  Read More >>

Fault Analysis in Cryptography

Fault Analysis in Cryptography

Author: Marc Joye ,  Michael Tunstall
ISBN: 9783642296550
Format: Hardback
$290.37

Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT...  Read More >>

Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings

Applied Cryptography and Network Security: 10th International...

Author: Feng Bao ,  Pierangela Samarati
ISBN: 9783642312830
Format: Paperback
$145.17

Constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security,...  Read More >>

Informations- und Kodierungstheorie

Informations- und Kodierungstheorie

Author: Dagmar Schönfeld ,  Herbert Klimant
ISBN: 9783834806475
Format: Paperback
$105.57

 Read More >>

Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy

Street Cryptography: A Quick and Dirty Way to Maintain...

Author: Christopher Forrest
ISBN: 9781478210153
Format: Paperback
$21.09

A quick and easy to use guide on creating your own cipher. This book covers several historic ciphers and builds...  Read More >>

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

Trust and Trustworthy Computing: 5th International Conference,...

Author: Stefan Katzenbeisser ,  Edgar Weippl
ISBN: 9783642309205
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing,...  Read More >>

Communication System Security

Communication System Security

Author: Lidong Chen ,  Guang Gong
ISBN: 9781439840368
Format: Hardback
$389.00

Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics...  Read More >>

Dynamics of Information Systems: Theory and Applications

Dynamics of Information Systems: Theory and Applications...

Author: Michael Hirsch ,  Panos M. Pardalos
ISBN: 9781461425809
Format: Paperback
$422.37

Our understanding of information and information dynamics has outgrown classical information theory.  Read More >>

Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers

Trustworthy Global Computing: 6th International Symposium,...

Author: Roberto Bruni ,  Vladimiro Sassone
ISBN: 9783642300646
Format: Paperback
$184.77

This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing,...  Read More >>

Optimal Estimation of Parameters

Optimal Estimation of Parameters

Author: Jorma Rissanen (Tampere University of Technology, Finland)
ISBN: 9780511791635
Format: Undefined
$435.60

This book presents a comprehensive and consistent theory of estimation. The framework described leads naturally...  Read More >>

Sequences and Their Applications -- SETA 2012: 7th International Conference, SETA 2012, Waterloo, ON, Canada, June 4-8, 2012. Proceedings

Sequences and Their Applications -- SETA 2012: 7th International...

Author: Tor Helleseth ,  Jonathan Jedwab
ISBN: 9783642306143
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications,...  Read More >>

Public Key Cryptography -- PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings

Public Key Cryptography -- PKC 2012: 15th International...

Author: Marc Fischlin ,  Johannes Buchmann
ISBN: 9783642300561
Format: Paperback
$145.17

Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography,...  Read More >>

Sensor Networks: Where Theory Meets Practice

Sensor Networks: Where Theory Meets Practice

Author: Gianluigi Ferrari
ISBN: 9783642262852
Format: Paperback
$448.77

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical...  Read More >>

Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

Critical Infrastructure Protection III: Third IFIP WG...

Author: Charles Palmer ,  Sujeet Shenoi
ISBN: 9783642260407
Format: Paperback
$290.37

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings

Trust Management VI: 6th IFIP WG 11.11 International...

Author: Theo Dimitrakos ,  Rajat Moona
ISBN: 9783642298516
Format: Hardback
$145.17

Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary...  Read More >>

Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

Information Security Technology for Applications: 16th...

Author: Peeter Laud
ISBN: 9783642296147
Format: Paperback
$184.77

The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement,...  Read More >>

Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography

Author: Steven D. Galbraith (University of Auckland)
ISBN: 9781139012843
Format: Undefined
$594.00

Public key cryptography is a major interdisciplinary subject with many real-world applications. This book has been...  Read More >>

Computational Complexity: A Modern Approach

Computational Complexity: A Modern Approach

Author: Sanjeev Arora (Princeton University, New Jersey) ,  Boaz Barak (Princeton University, New Jersey)
ISBN: 9780511804090
Format: Undefined
$594.00

Describes recent achievements and classical results of computational complexity theory, including interactive proofs,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List