Free Delivery Over $100
3712 books were found.
This book provides the first unified overview of the burgeoning research area at the interface between Quantum Foundations... Read More >>
Read More >>
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to... Read More >>
If you have a question about Cryptography this is the book with the answers. Cryptography: Questions and Answers... Read More >>
This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation... Read More >>
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC... Read More >>
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts... Read More >>
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop)... Read More >>
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can... Read More >>
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used... Read More >>
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them.... Read More >>
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in... Read More >>
The 3rd International Conference on Cloud Security Management (ICCSM-2015) invites researchers, practitioners and... Read More >>
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes... Read More >>
While the classic model checking problem is to decide whether a finite system satisfies a specification, the goal... Read More >>
Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information... Read More >>
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite.... Read More >>
In this book, new developments in network coding and data compression are examined. The first chapter proposes a... Read More >>