Free Delivery Over $100
3712 books were found.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and... Read More >>
Existing wired network jacks are located inside buildings already secured from unauthorized access through the use... Read More >>
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields,... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). Read More >>
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational... Read More >>
This book addresses the fundamental concepts in the theory and practice of visual cryptography. reviews a range... Read More >>
""Fundamentals of Speaker Recognition"" introduces Speaker Identification, Speaker Verification, Speaker (Audio... Read More >>
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 15th IFIP WG 8.5 International Conference on Electronic Government,... Read More >>
explains how the network design paradigm for smart grids differs from that for more established data networks, and... Read More >>
The Handbook on Ontologies provides a comprehensive overview of the current status and future prospects of the field,... Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Electronic Government and... Read More >>
Alan Turing - a mathematician, codebreaker, computer scientist and biologist. Widely regarded as a war hero grossly... Read More >>
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS... Read More >>
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded... Read More >>
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Economics of Grids, Clouds,... Read More >>