Free Delivery Over $100
3712 books were found.
This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the... Read More >>
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography,... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated... Read More >>
Contains proceedings of the International Centre for Pure and Applied Mathematics Summer School course held in Ankara,... Read More >>
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore... Read More >>
Read More >>
<p>This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and... Read More >>
<p>This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information... Read More >>
The Handbook on Ontologies provides a comprehensive overview of the current status and future prospects of the field,... Read More >>
<p>This volume constitutes the selected papers of the 15th Annual International Workshop on Selected Areas in Cryptography,... Read More >>
Constitutes the refereed proceedings of the 6th International Conference, ICGS3, that was held in Braga, Portugal,... Read More >>
<p>This book constitutes the refereed proceedings of the 16th String Processing and Information Retrieval Symposium,... Read More >>
<p>This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO... Read More >>
<p>This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters... Read More >>
This book constitutes the refereed proceedings of the Fourth International Conference on Rough Sets and Knowledge... Read More >>
<p>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography,... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference... Read More >>
Covers the proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.... Read More >>
The plenary session on Digital Forensics Practice included Troy O’Malley, Que- sland Police Service, who outlined... Read More >>
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT... Read More >>
<p>This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and... Read More >>
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009,... Read More >>
Constitutes the refereed proceedings of the 8th International Symposium on Experimental and Efficient Algorithms,... Read More >>