Free Delivery Over $100
3712 books were found.
This book examines comparatively the US and the UK governments' management of Y2K and considers the extent to which... Read More >>
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. The conference... Read More >>
Constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in... Read More >>
This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system... Read More >>
After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged).... Read More >>
Read More >>
The capability of MNCs to create, transfer and combine knowledge from different locations is an important determinant... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
One of the most important key technologies for digital communication systems as well as storage media is coding... Read More >>
Constitutes the refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and... Read More >>
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies,... Read More >>
Objektorientiertes Programmieren mit Java - in der neuen Version 6: Systematisch, gründlich und Schritt für Schritt... Read More >>
The probability propagation algorithm is proven in c- junctionwithatree-structuredgraph–graphswithoutanycycle.Infact,thegraphical... Read More >>
Identity technologies are problematic, and many see light at the end of the identity theft tunnel. The light is... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
Covers error-correcting codes, automorphism groups of codes, the key equation for codes from order domains, codes... Read More >>
Presents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007,... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
As individual needs have arisen in the fields of physics, electrical engineering and computational science, each... Read More >>
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography,... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards... Read More >>
The main theme in this book is to teach modeling based on the principle that the objective is to extract the information... Read More >>