Free Delivery Over $100
3712 books were found.
Read More >>
Constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held... Read More >>
<p>This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and... Read More >>
Topics addressed include quantum algorithms, models of quantum computation, quantum complexity theory, simulation... Read More >>
Constitutes the refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust,... Read More >>
Speech Dereverberation presents a mathematical formulation of the problem and the state-of-the-art solutions for... Read More >>
This text is a light technical introduction to the three technical foundations for multimedia applications across... Read More >>
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition... Read More >>
The last of three volumes which examines the work of the mathematician A.N. Kolmogorov. This volume contains original... Read More >>
It does so by introducing the fundamentals of XML, Document Type De?nitions (DTDs), XML Namespaces, XML Schema,... Read More >>
Complements the literature on information and coding theory by concentrating on arbitrary nonstationary and/or nonergodic... Read More >>
"In 1953, the first volume of ""Studia Logica"" appeared under the auspices of The Philosophical Committee of The... Read More >>
"" The vigorous growth in the study of algorithmic information theory has continued during the past few years, which... Read More >>
An even more fundamental need is to understand how organisations create new knowledge if this knowledge creation... Read More >>
With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was... Read More >>
With the significant advances in the last decade, the concept of ad hoc networks now covers an even broader scope,... Read More >>
This book presents material on three topics, namely the amount of information involved in non-random functions,... Read More >>
Coding for Wireless Channels is an accessible introduction to the theoretical foundations of modern coding theory,... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
Whereas classical cryptography was confined to the art of designing and breaking encryption schemes (or ""secrecy... Read More >>
Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research... Read More >>
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression,... Read More >>
Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security,... Read More >>