Free Delivery Over $100
3712 books were found.
Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Advances in Information... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions... Read More >>
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held... Read More >>
Constitutes the refereed proceedings of the Future Multimedia Networking Workshop, FMN 2010, held in Krakow, Poland,... Read More >>
Because of this success, we launched a call for papers dedicated to computer security from it’s foundation to practice,... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
This book constitutes the refereed proceedings of the 18th International... Read More >>
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC... Read More >>
Cryptography is a branch of both mathematics and computer science, and is affiliated closely with information theory,... Read More >>
A general description of how Actual Matrix Encryption works. There is enough information presented so that a programmer... Read More >>
Cet ouvrage (2e edition actualisee et augmentee) presente les fondements theoriques de la virologie informatique,... Read More >>
Constitutes the refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications,... Read More >>
Shannon’s theory has also attractedmuch interest in a more philosophic look at information, although it was readily... Read More >>
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications... Read More >>
Constitutes the papers of the Third International Conference on E-business and Telecommunication Networks, ICETE... Read More >>
Constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security,... Read More >>
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and... Read More >>
The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols,... Read More >>
<p>This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and... Read More >>
<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA... Read More >>