Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications,... Read More >>
This book constitutes the proceedings of the Third International Conference on Space Information Networks, SINC... Read More >>
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking,... Read More >>
This book constitutes revised selected papers from the 21st International Conference on Information Security and... Read More >>
This book constitutes revised selected papers from the First International Workshop on Software Engineering Aspects... Read More >>
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses... Read More >>
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference,... Read More >>
Read More >>
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography,... Read More >>
The fifth volume of Rudolf Ahlswede’s lectures on Information Theory focuses on several problems that were at the... Read More >>
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security,... Read More >>
Written for investors, regulators, businesses, governments, lawmakers, lawyers, journalists, software developers,... Read More >>
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game... Read More >>
It also demonstrates the calculation of split channel capacities when polar codes are employed for binary erasure... Read More >>
The book is divided into four chapters, the first of which introduces readers to lossless coding, provides an intrinsic... Read More >>
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with... Read More >>
This book investigates the permutation polynomial (PP) based interleavers for turbo codes, including all the main... Read More >>
This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security... Read More >>
concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale... Read More >>
This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable... Read More >>
Password Internet Logbook Book Details: forget PASSWORD! what should I do! Solve problems by taking... Read More >>
This stylish and practical Notebook (6 x 9 inch; 22.86 x 15.24 cm) for cryptographers has been beautifully hand-designed... Read More >>
It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation... Read More >>