Free Delivery Over $100
4112 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,... Read More >>
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,... Read More >>
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray... Read More >>
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results... Read More >>
Read More >>
Addressing the various security issues confronting our Information Society, this title covers the following topics:... Read More >>
For over 30 years, the Maxent workshops have explored Bayesian and Maximum Entropymethods in scientific, engineering,... Read More >>
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services,... Read More >>
NIST SP 800-133 Cryptography is often used in an information technology security environment to protect data that... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
This is a classic book on Queues. First published in 1961 it clearly and concisely introduces the theory of queueing... Read More >>
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect... Read More >>
* Sorting, often perceived as rather technical, is not treated as a separate chapter, but is used in many examples... Read More >>
The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security... Read More >>
This clearly written and enlightening textbook provides a concise, introductory guide to the key mathematical concepts... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security,... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information... Read More >>
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation... Read More >>
Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus... Read More >>
A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing,... Read More >>
Aus der Analyse bisheriger Ansätze des Data Warehousing werden in diesem Buch Lösungen für essenzielle Problemstellungen... Read More >>