Free Delivery Over $100
3712 books were found.
Constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>
Constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application... Read More >>
Constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business... Read More >>
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related... Read More >>
Read More >>
Digitale Fernseh- und Horfunktechnik in Theorie und Praxis ist eine deutlich erweiterte zweite Auflage von Walter... Read More >>
Constitutes the papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007,... Read More >>
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure... Read More >>
This book examines comparatively the US and the UK governments' management of Y2K and considers the extent to which... Read More >>
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH... Read More >>
The papers present current original research and focus on theoretical aspects of quantum computation, quantum communication,... Read More >>
These are the proceedings of IPTComm 2008 – the Second Conference on Pr- ciples,Systems andApplications ofIP Telecommunications–heldinHeidelberg,... Read More >>
Describes research results and innovative applications in the interdisciplinary field of critical infrastructure... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications... Read More >>
The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key... Read More >>
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest... Read More >>
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer... Read More >>
Constitutes the proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island,... Read More >>
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and... Read More >>
This book provides a thorough description of hypercomputation, covering all attempts at devising conceptual hypermachines... Read More >>
Ingenious methods for encoding secrets have taken many amazing turns down through the ages, from the military signals... Read More >>