Free Delivery Over $100
3712 books were found.
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection... Read More >>
It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability... Read More >>
This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information... Read More >>
This book grew out of our lectures given in the Oberseminar on 'Cod ing Theory and Number Theory' at the Mathematics... Read More >>
Information, Coding and Mathematics is a classic reference for both professional and academic researchers working... Read More >>
Shows that theoretical computer science is a fascinating discipline. This book also presents the development of... Read More >>
The first attempt to write a monograph on information-theoretic approach to thermodynamics was done by one of the... Read More >>
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop... Read More >>
Objectives Computer and communication practice relies on data compression and dictionary search methods. We include... Read More >>
This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations... Read More >>
A reference for both academic and professional researchers in the field of security and trust. The papers presented... Read More >>
Contains the lectures given at the Second Conference on Dynamics and Randomness held at the Centro de Modelamiento... Read More >>
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key... Read More >>
This research book presents the agent theory and adaptation of agents in different contexts. Because rules are the... Read More >>
Nowadays algebra is understood basically as the general theory... Read More >>
Reporting the state of the art of color image processing, this monograph fills an existing gap in the literature... Read More >>
Starting with fingerprints more than a hundred years ago, there has been ongoing research in biometrics. With the... Read More >>
This is an overview of key establishment protocols. Read More >>
Focuses attention on some specific developments in the theory and applications of finite fields. This book studies... Read More >>
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand... Read More >>
Given data on a sample from some population, we aimed to discover whether the population should be considered to... Read More >>
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide... Read More >>
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem... Read More >>
Studies modern concepts of Computer Security. This book introduces the basic mathematical background necessary to... Read More >>
The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. Read More >>