Free Delivery Over $100
3712 books were found.
This book is about Transparent Intensional Logic, the brainchild of Pavel Tichý. But we, the three authors, have... Read More >>
<p>This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing... Read More >>
Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September... Read More >>
Constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security,... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware,... Read More >>
Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held... Read More >>
Constitutes the refereed post-conference proceedings of the 14th International Conference on Financial Cryptography... Read More >>
Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea,... Read More >>
Constitutes the refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International... Read More >>
This book discusses recent advances covering optical solitons, soliton perturbation, optical cross-talk, Gabitov-Turitsyn... Read More >>
Read More >>
Constitutes the refereed proceedings of the Third International Workshop on the Arithmetic of Finite Fields, WAIFI... Read More >>
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus... Read More >>
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications... Read More >>
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the... Read More >>
Constitutes the refereed proceedings of the 4th International Conference on Information Security and Assurance,... Read More >>
The different attributes of dependability and security cannot be considered in isolation for today’s critical systems,... Read More >>
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST),... Read More >>
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in... Read More >>
These cover various topics such as Satellite Communications: Coding and Modulations, Multimedia Integration, Satellite... Read More >>
Offers a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer... Read More >>
Constitutes the refereed proceedings of the 4th IFIP WG 11.11 International Conference, IFIPTM 2010, held in Morioka,... Read More >>
This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also... Read More >>
Cryptography plays a crucial role in many aspects of today's world. This book comes with plenty of examples and... Read More >>
Based on the authors' teaching experiences, this book provides a thoroughly modern introduction to the coding theory... Read More >>