Free Delivery Over $100
3712 books were found.
<p>This volume constitutes the selected papers of the International Conference on Security Technology, SecTech 2009,... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
<p>The LLL algorithm is a polynomial-time lattice reduction algorithm, named after its inventors, Arjen Lenstra,... Read More >>
After an introduction to cryptography and data security, the authors of this book explain the main techniques in... Read More >>
<p>This book constitutes the proceedings of the 2009 International Conference on Database Theory and Application,... Read More >>
<p>This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding,... Read More >>
Cryptology, for millennia a ""secret science"", is rapidly gaining in practical importance for the protection of... Read More >>
This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM... Read More >>
This book emphasizes the principles of digital transmission rather than modern technologies. Each topic is addressed... Read More >>
The parallel technical spons- ships from the ACM SIGSAC (the ACM interest group in security) and ACM SIGSOF (the... Read More >>
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN... Read More >>
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University... Read More >>
Read More >>
Topics addressed are such as quantum algorithms, models of quantum computation, quantum complexity theory, simulation... Read More >>
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during... Read More >>
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security,... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT... Read More >>
This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems... Read More >>
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates... Read More >>