Free Delivery Over $100
3736 books were found.
It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses... Read More >>
3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch... Read More >>
This book includes additional features to the first edition which offered a practical introductory approach to the... Read More >>
Constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption,... Read More >>
Thisvolumecontainsrefereedpapersdevotedtocodingandcryptography.These papers arethe full versionsof a selectionof... Read More >>
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled... Read More >>
Read More >>
The 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra... Read More >>
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory... Read More >>
Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,... Read More >>
Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers... Read More >>
Contains the proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information... Read More >>
Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,... Read More >>
In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence... Read More >>
Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type... Read More >>
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography;... Read More >>
Constitutes the proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala... Read More >>