Free Delivery Over $100
3736 books were found.
Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
As individual needs have arisen in the fields of physics, electrical engineering and computational science, each... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards... Read More >>
The main theme in this book is to teach modeling based on the principle that the objective is to extract the information... Read More >>
Das vorliegende Buch gibt einen Einblick in die grundlegenden Verfahren, die für eine effiziente und sichere Übertragung... Read More >>
Consists of contributions related mostly to public-key cryptography, including the design of new cryptographic primitives... Read More >>
This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
The 27th Annual International Cryptology Conference was held in Santa Barbara, California, in August 2007. The conference... Read More >>
The Most Progressive and Complete Guide to DDO-Based CiphersDevelopers have long recognized that ciphers based on... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
Constitutes the refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data... Read More >>
Includes two chapters on various applications that cover topics such as electronic mail, Internet security, protocol... Read More >>
An encyclopedia that contains information on various aspects of cryptography and security. It covers subject areas... Read More >>
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic... Read More >>
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This... Read More >>
Information security experts in industry can use the book as a guide for understanding what is needed to implement... Read More >>