Coding theory & cryptology books

3712 books were found.

Quantum Theory: Informational Foundations and Foils

Quantum Theory: Informational Foundations and Foils...

Author: Giulio Chiribella ,  Robert W. Spekkens
ISBN: 9789401773027
Format: Hardback
$422.37

This book provides the first unified overview of the burgeoning research area at the interface between Quantum Foundations...  Read More >>

Time Delay Measurements of Key Generation Process on Smart Cards

Time Delay Measurements of Key Generation Process on...

Author: Penny Hill Press Inc ,  Naval Postgraduate School
ISBN: 9781522955399
Format: Paperback
$34.19

Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to...  Read More >>

Cryptography: Questions and Answers

Cryptography: Questions and Answers

Author: George a Duckett
ISBN: 9781522820666
Format: Paperback
$39.60

If you have a question about Cryptography this is the book with the answers. Cryptography: Questions and Answers...  Read More >>

Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings

Security Standardisation Research: Second International...

Author: Liqun Chen ,  Shin'ichiro Matsuo
ISBN: 9783319271514
Format: Paperback
$103.47

This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation...  Read More >>

Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

Cryptography and Coding: 15th IMA International Conference,...

Author: Jens Groth
ISBN: 9783319272382
Format: Paperback
$116.41

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC...  Read More >>

Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings

Advanced Concepts for Intelligent Vision Systems: 16th...

Author: Sebastiano Battiato ,  Jacques Blanc-Talon
ISBN: 9783319259024
Format: Paperback
$116.41

This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts...  Read More >>

Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings

Information Security Theory and Practice: 9th IFIP WG...

Author: Raja Naeem Akram ,  Sushil Jajodia
ISBN: 9783319240176
Format: Paperback
$116.41

This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop)...  Read More >>

Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

Visual Cryptography for Image Processing and Security:...

Author: Feng Liu ,  Wei Qi Yan
ISBN: 9783319234724
Format: Hardback
$145.17

 Read More >>

Dynamic Secrets in Communication Security

Dynamic Secrets in Communication Security

Author: Sheng Xiao ,  Weibo Gong
ISBN: 9781493902293
Format: Paperback
$145.17

 Read More >>

Shishi - Kerberos 5 Implementation

Shishi - Kerberos 5 Implementation

Author: Simon Josefsson
ISBN: 9789888381777
Format: Paperback
$79.17

Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can...  Read More >>

GNU GSS Library: Generic Security Service

GNU GSS Library: Generic Security Service

Author: Simon Josefsson
ISBN: 9789888381661
Format: Paperback
$52.77

GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used...  Read More >>

GnuTLS Reference Manual

GnuTLS Reference Manual

Author: Simon Josefsson ,  Daiki Ueno
ISBN: 9789888381647
Format: Paperback
$79.17

GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them....  Read More >>

Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

Applications and Techniques in Information Security:...

Author: Wenjia Niu ,  Gang Li
ISBN: 9783662486825
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in...  Read More >>

Iccsm 2015 - The Proceedings of the 3rd International Conference on Cloud Security and Management

Iccsm 2015 - The Proceedings of the 3rd International...

Author: Barbara Endicott-Popovsky
ISBN: 9781910810613
Format: Paperback
$103.50

The 3rd International Conference on Cloud Security Management (ICCSM-2015) invites researchers, practitioners and...  Read More >>

Leading Issues in Cyber Warfare and Security

Leading Issues in Cyber Warfare and Security

Author: Julie Ryan
ISBN: 9781910810644
Format: Paperback
$49.16

Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes...  Read More >>

Decidability of Parameterized Verification

Decidability of Parameterized Verification

Author: Roderick Bloem ,  Swen Jacobs
ISBN: 9783031008832
Format: Paperback
$131.97

While the classic model checking problem is to decide whether a finite system satisfies a specification, the goal...  Read More >>

Computation, Cryptography, and Network Security

Computation, Cryptography, and Network Security

Author: Nicholas J. Daras ,  Michael Th. Rassias
ISBN: 9783319182742
Format: Hardback
$290.37

Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information...  Read More >>

GnuPG - Using the GNU Privacy Guard

GnuPG - Using the GNU Privacy Guard

Author: The Gnupg Project
ISBN: 9789888381159
Format: Paperback
$65.97

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite....  Read More >>

Why Cryptography Should Not Rely on Physical Attack Complexity

Why Cryptography Should Not Rely on Physical Attack...

Author: Juliane Krämer
ISBN: 9789812877864
Format: Hardback
$290.37

 Read More >>

Performances of Peace: Utrecht 1713

Performances of Peace: Utrecht 1713

Author: Renger Bruin ,  Cornelis Haven
ISBN: 9789004304772
Format: Hardback
$451.44

 Read More >>

Network Coding & Data Compression: Theory, Applications & Challenges

Network Coding & Data Compression: Theory, Applications...

Author: Maryann Simmons
ISBN: 9781634831857
Format: Hardback
$413.97

In this book, new developments in network coding and data compression are examined. The first chapter proposes a...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List