Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 4th International Workshop on the Arithmetic of Finite Field,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted... Read More >>
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS... Read More >>
Professor Halloway, an American archaeologist, has spent more than twenty years digging at the foot of Mount Karkom... Read More >>
Focuses on the Group Cell architecture with multi-cell generalized coordination, Contrast Analysis between Group... Read More >>
Alexander Tsolkas und Friedrich Wimmer erklären anhand von Beispielen, welche Informationen aus diesen im Wirtschaftskreislauf... Read More >>
They are organized in topical sections on signature schemes, stream ciphers, applications of information theory,... Read More >>
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy,... Read More >>
Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security,... Read More >>
Read More >>
A quick and easy to use guide on creating your own cipher. This book covers several historic ciphers and builds... Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing,... Read More >>
Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics... Read More >>
Our understanding of information and information dynamics has outgrown classical information theory. Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing,... Read More >>
This book presents a comprehensive and consistent theory of estimation. The framework described leads naturally... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications,... Read More >>
Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary... Read More >>
The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement,... Read More >>
Public key cryptography is a major interdisciplinary subject with many real-world applications. This book has been... Read More >>
Describes recent achievements and classical results of computational complexity theory, including interactive proofs,... Read More >>