Free Delivery Over $100
3712 books were found.
The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network... Read More >>
They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography... Read More >>
The use of chaotic signals in communications thus naturally inherits the advantages that are currently being offered... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security,... Read More >>
This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC... Read More >>
The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic... Read More >>
Additive noise is ubiquitous in acoustics environments and can affect the intelligibility and quality of speech... Read More >>
They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data... Read More >>
The symposium provides a forum forresearchers, educators, engineers, and government officials to presentand discuss... Read More >>
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past... Read More >>
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for... Read More >>
(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several... Read More >>
This book constitutes the refereed proceedings of the 6th InternationalJoint Conference on e-Business and Telecommunications,... Read More >>
The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International... Read More >>
Table of Contents: Population Protocols / The Computational Power of Population Protocols / Enhancing the model... Read More >>
Multibiometric systems are expected to meet the stringent performance requirements imposed by large-scale authentication... Read More >>
This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software... Read More >>
The areas of cryptography, automata and learning theory have strong theoretical foundations with more practical... Read More >>
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore... Read More >>
Constitutes the refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security... Read More >>