Free Delivery Over $100
3712 books were found.
The book has many novel features including: full provision of web-based material on almost every topic covered;... Read More >>
Die Erforschung komplexer Strukturen ist gegenwartig eines der interessantesten wissenschaftlichen Themen. Dieses... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012,... Read More >>
The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions.... Read More >>
A quorum system is a collection of subsets of nodes, called quorums, with the property that each pair of quorums... Read More >>
Current Research Topics on Galois Geometrics Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure... Read More >>
According to the topics of the particular conference the papers are organized in thematical parts on data communication... Read More >>
High Quality Content by WIKIPEDIA articles! In cryptography, the Password Authenticated Key Exchange by Juggling... Read More >>
Particularly based on one of the author’s long experience in development of wireless systems (AB), and the other’s... Read More >>
There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory,... Read More >>
This book is the outcome of the successful NATO Advanced Study Institute on Pattern Recognition Theory and Applications,... Read More >>
This book focuses on classical noise modeling and its practical applications, covering such topics as statistical... Read More >>
This volume contains all papers presented at the workshop ""Sequences '91: Methods in Communication, Security and... Read More >>
Oversampled Delta-Sigma Modulators: Analysis, Applications, and Novel Topologies presents theorems and their mathematical... Read More >>
A resource and monograph for all security researchers and practitioners who want to understand and effectively use... Read More >>
Russian Business in the Brüning Era.- Reviews of Literature: A Review of the New Literature on Business History.-... Read More >>
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is... Read More >>
Bildcodierungsverfahren wie JPEG und MPEG gehören zu den Voraussetzungen digitaler Kommunikation. Das Buch ist für... Read More >>
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure... Read More >>
This authoritative exam guide prepares readers to take the first step towards the coveted CISSP certification-the... Read More >>
Multiple-Base Number System: Theory and Applications Read More >>
The author explores the impediments to efficient wireless transmission and techniques and proposes ways to mitigate... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding,... Read More >>