Free Delivery Over $100
3712 books were found.
Während die moderne Kryptologie mathematisch strenge Konzepte und Methoden aus der Komplexitätstheorie verwendet,... Read More >>
Read More >>
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced... Read More >>
<p>This book constitutes the refereed proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop held... Read More >>
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital... Read More >>
These emerging technologies put new requirements on security and data m- agement. Therefore, research in secure... Read More >>
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key... Read More >>
<p>From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts... Read More >>
Provides comprehensive treatment of the major areas of computer security, aiming to give readers a foundation in... Read More >>
The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports,... Read More >>
<p>The explosive popularity of the Internet as a business tool has created a new type of economy, which is called... Read More >>
<p>Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd... Read More >>
Provides an essential reference for anyone interested in the effective management of semsistructured data. This... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
<p>Communications and Multimedia Security is an essential reference for both academic and professional researchers... Read More >>
<p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part... Read More >>
Based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April... Read More >>
<p>In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing... Read More >>
Constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA... Read More >>
The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized... Read More >>
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held... Read More >>
<p>This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated... Read More >>
<p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT... Read More >>
<p>This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public... Read More >>