Free Delivery Over $100
3736 books were found.
Read More >>
This Recommendation specifies a message authentication code (MAC) algorithm based on asymmetric key block cipher.... Read More >>
Most of us experience the interactions of cryptogrophy, communications, and computers as we go about our daily activities.... Read More >>
Details the important techniques used to make the storage and transmission of data fast, secure, and reliable. This... Read More >>
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in... Read More >>
This new, one-of-a-kind volume contains original essays, historical and technical papers, and translations of historical... Read More >>
This text is a light technical introduction to the three technical foundations for multimedia applications across... Read More >>
It does so by introducing the fundamentals of XML, Document Type De?nitions (DTDs), XML Namespaces, XML Schema,... Read More >>
We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004.... Read More >>
Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption... Read More >>
In this new approach, the authors consider the data network as a channel (in the sense of information theory) with... Read More >>
A reference for both academic and professional researchers in the field of security and trust. The papers presented... Read More >>
Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography,... Read More >>
It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop... Read More >>
Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small... Read More >>
Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and... Read More >>
Speci?cally, an error-correcting code takes a short binary string, called the message, and shows how to transform... Read More >>
This volume covers Rijndael, a new encryption standard. It also gives explanations of the ideas behind the algorithms,... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages... Read More >>
With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one... Read More >>
This revised and extended edition includes new material on the AES encryption algorithm, the SHA-1 Hash algorithm,... Read More >>