Free Delivery Over $100
3736 books were found.
To ?nd an algorithmthat gets by without rand- ness, solves the problem error-free, and has polynomial running time... Read More >>
Read More >>
This book also includes a sample of research, conducted by Professor Xiao's former and current students.Progress... Read More >>
Describes recent discoveries on how to design advanced malicious computer viruses, worms, and Trojan horses. The... Read More >>
Focuses on cross-fertilisations between stream ciphers and number theory. This work covers known connections between... Read More >>
The first biography of America's first codebreaker. Also contains... Read More >>
A broad overview and exposition of one of the most widely used cryptosystems in wireless devices and smartcards... Read More >>
PREFACE The increasing demand on high data rate and quality of service in wireless communication has to cope with... Read More >>
As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government... Read More >>
A survey of the principles, methods, and technologies used in biometrics personal recognition and identification... Read More >>
Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line... Read More >>
This book constitutes the thoroughly refereed postproceedings of the 10th International Workshop on Fast Software... Read More >>
This new book provides a presentation of a flexible, platform-independent cryptographic security architecture which... Read More >>
Das Lehrbuch uber Codierungstheorie fur Mathematik- und Informatik-Studenten setzt ausser elementarem Grundwissen... Read More >>
This is an overview of key establishment protocols. Read More >>
Introduces the process' integral information measure, which has a distinctive difference from information approaches... Read More >>